Information Literecy Docx 2

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Patrick Mugwanja

Information literacy
Administrator

1

Answer 1.
Majority of mobile apps will fail basic security tests in the future: Gartner
Summary: The research firm claims that 75 percent of all mobile applications will fail basic security tests
next year -- leaving the enterprise vulnerable.
Charlie Osborne
By Charlie Osborne for Between the Lines | September 15, 2014 -- 09:59 GMT (02:59 PDT)
password_security
Gartner claims that through next year, 75 percent of mobile apps will fail the most basic of security
tests.
The research firm says that in 2015, the majority of mobile applications -- whether in the Android, iOS or
Windows Phone ecosystems -- will not have basic business-acceptable security protocols in place. This
poses a serious problem for the enterprise, where bring-your-own-device (BYOD) schemes are
commonplace. Should employees download apps which can access enterprise assets or perform
business functions, but have no basic standards of security in place, not only are enterprise security
policies at risk of violation but sensitive corporate data and networks may also become vulnerable.
Dionisio Zumerle, principal research analyst at Gartner commented:
"Enterprises that embrace mobile computing and bring your own device (BYOD) strategies are
vulnerable to security breaches unless they adopt methods and technologies for mobile application
security testing and risk assurance. Most enterprises are inexperienced in mobile application security.
Even when application security testing is undertaken, it is often done casually by developers who are
mostly concerned with the functionality of applications, not their security."
Zumerle said that existing static application security testing (SAST) and dynamic application security
testing (DAST) vendors will need to modify and adjust their tests to address mobile technologies. Both
SAST and DAST have been used for the past decade, but mobile applications -- due to their variety and
reliance on continually evolving mobile operating systems -- are a fresh challenge.
What's Hot on ZDNet
With Android One, Google puts itself firmly back in the OS' driving seat
Best 10 smartphones for the 2014 holiday buying season
Apple's appalling iPhone 6 camera compromise
Patrick Mugwanja
Information literacy
Administrator

2

Apple CEO Tim Cook on secret products, Steve Jobs, IBM deal, Google rivalry, and the 'screw ups'
Gartner believes that in addition to SAST and DAST, new kinds of test based on behavioral analysis are
emerging for mobile devices. These tests monitor the GUI and running background applications in order
to detect malicious or risky behaviour. For example, a music player which also accesses contact lists or
geolocation could be suspicious.
However, this is not necessarily enough -- and enterprise users should also make sure servers, which
communicate with mobile devices, are continually tested and protected.
"Today, more than 90 percent of enterprises use third-party commercial applications for their mobile
BYOD strategies, and this is where current major application security testing efforts should be applied,"
noted Zumerle.
"App stores are filled with applications that mostly prove their advertised usefulness. Nevertheless,
enterprises and individuals should not use them without paying attention to their security. They should
download and use only those applications that have successfully passed security tests conducted by
specialized application security testing vendors."
Gartner predicts that by 2017, endpoint breaches will be focused on smartphones and tablets, and
"security features that mobile devices offer today will not suffice to keep breaches to a minimum." In
addition, the research firm recommends that the enterprise uses application containment -- such as
wrapping and software development kits (SDKs) -- to better protect data.
Through 2017, Gartner predicts that 75 percent of mobile security breaches will be the result of mobile
application misconfigurations, such as the misuse of personal cloud storage in tandem with enterprise
data.
Read on: In the world of security
How to hack Gmail 92 percent of the time
68 percent of top free Android apps vulnerable to cyberattack, researchers claim
North Korea cyber warfare capabilities exposed
FBI investigates hack of JPMorgan, other US banks
Sony PlayStation Network struck by DDoS attack, bomb threat grounds executive
Topics: Mobility, Apps, Security
Charlie Osborne
Patrick Mugwanja
Information literacy
Administrator

3

About Charlie Osborne
London-based Charlie Osborne is a journalist, freelance photographer and former teacher. She holds a
degree in Medical Anthropology.
Google+ Contact Disclosure
Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served
hot. Get it.
Answer 2.

Garner claims that next year 75% of the mobile app will fail the most basic security test. Zumerle
adds that the existing static application security test (SAST) AND DDYNAMIC APPLICACTION TESTING
(DAST) WILL NEEE D TO MODIFY AND ADJUST TO ADDRESS MOBILE technologies. Garner predicts by
2017, end point breaches will be focused on smartphones and tablets and the decurity features that the
mobile devices offer today will not suffice to keep breaches to a minimum. He recommended that the
enterprise uses applicaction containment such as wrapping and software development kit (SDKs).
Answer 3.
www.pcworld
www.gmsa.com/publicpolicy
The gmsa is better because it is not marketing any product. It is addressing predominetly the challegein
the mobile sector privacy. www.pcworld is biases in sense of show to be better.
Answer 4.
1)Written on Dec 5
th
2013
2)He is qualified to write on the topic since he has much experience.

3)Tony Bradley is principal analyst with the Bradley Strategy Group, providing analysis and insight
on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books,
and is a frequent speaker at industry events.

Patrick Mugwanja
Information literacy
Administrator

4


4)The information is trustworthy since the products have been tested.
5)Tony wrote to inform the public that the better solution is for developers to build security and
privacy into the apps from square one. Developers should be aware of the potential implications of how
their apps access data and interact with other apps, and design them to be secure by default.
Answer 5.
a) Mobile privacy.
b) Journal of the internet law.
Ccbc Database
Answer 6.
Ease of access
In ccbc Data it was easy access the journal .In the internet it was not easy to identify the reliable source.
Timeless.
The Articles at ccbc database has been updated regularly. In the internet the journels are not updated.
Authority
In the ccbc database the journals are written by experience and professional people. In the internet
journal are written by non-professionals.








Patrick Mugwanja
Information literacy
Administrator

5



Answer 7.
Works Cited
Tama, Julia Kernochan. "Mobile Data Privacy: Snapshot Of An Evolving Landscape." Journal Of
Internet Law 16.5 (2012): 1-23. Business Source Premier. Web. 15 Sept. 2014.

Works Cited
Crosman, Penny. "Four Ways The FTC's New Privacy Rules Affect Mobile Banking Apps."
American Banker 178.20 (2013): 2. Business Source Premier. Web. 15 Sept. 2014.

Works Cited
Tama, Julia Kernochan. "Mobile Data Privacy: Snapshot Of An Evolving Landscape." Journal Of Internet
Law 16.5 (2012): 1-23. Business Source Premier. Web. 22 Sept. 2014.
Works Cited
Schwabach, Aaron. Internet And The Law : Technology, Society, And Compromises. Santa Barbara, Calif:
ABC-CLIO, 2006. eBook Collection (EBSCOhost). Web. 22 Sept. 2014.
Works Cited
Fulton, Camilla. "Web Accessibility, Libraries, And The Law." Information Technology & Libraries 30.1
(2011): 34-43. Academic Search Premier. Web. 22 Sept. 2014.

You might also like