Monday, 3 March 2014

Research Questions/Objectives

In this blog I will put forth my research questions that will help fuel my artefact design and evaluation. Each research question will have to be focused and measurable and to show how it's measurable I will be showing how it will be calculated/evaluated.

Research Questions/Objectives

1. Using a Risk Management Framework, design and implement an Architectural Risk Assessment Strategy for Mobile Devices. Which is the most relevant Framework?
This will be measured by the actual implementation/creation of the strategy and evaluation will be provided by colleagues at the company the strategy is for.

2. What are the exploits that are considered the highest risks by an organisation?
This will be measured using semi-structured interviews and quantitative risk matrix's with me evaluating the results the team at the company give back to me.

3. What are the features of an Enterprise mobile application that are of the highest security concern to an organisation?
This will be measured using semi-structured interviews and quantitative risk matrix's with me evaluating the results the team at the company give back to me.

4. Is Excel capable of automating a process such as a Risk Assessment Strategy with minimal user interaction?
This will be measured by designing the Risk assessment using excel and by evaluating how much information the user has to enter before a Risk Rating is calculated.


So far these are the only research questions I have but after a meeting tomorrow with my supervisor i'm sure I can add a few more.

Thank you very much for reading!! Stayed tune for more. You Stay Classy Bournemouth.

Key Points

Todays post will contain my key points/conclusions from all of the articles I've been reading and writing notes on (6000 words of notes). The conclusions will involve key articles i've been reviewing that gave me the most relevant information, centring around trends and key points that pop up throughout the articles. One point I will make is i still have several articles left to review and further key points are bound to appear on the list.

Justification of my sources has been noted down in my notes and most of the justification revolves around the articles coming from veritable sources and the fact that the articles have used a wide array of research and evidence to back up their points.

A Standard for developing secure mobile applications (Dye & Scarfone, 2013)
This article provided an overview/analysis of a standard for developing a secure mobile platform. The standard had been developed by the NSA so it was very security focused. This article was extremely useful to me as it firstly gave an overview of why mobile devices are being targeted, and outlined various mistakes that developers make when writing mobile applications. It went into a lot of detail around what apps should and shouldn't do, and explained key differences in desktop applications and mobile applications. It also provided an overview of the skills and challenges faced when testing applications for vulnerabilities.

A Secure Software Architecture for Mobile Computing (Reza & Mazumder, 2012)
This articles focuses on the architecture of smart phones and compares the security of the most common operating systems. It was useful as it provided information regarding the limitations of smart phones, comparisons between apples Walled In security architecture and Androids permission and open source approach. The article's focused remained on Android as it predicted this to be the most widely used OS in the future. The article helped me understand the key differences between android and iOS, with all key points it provided repeated throughout other articles.

Emerging Security Threats for Mobile Platforms (Delac & Silco & Krolo, 2011)
This article focused on the threats mobile devices are beginning to face. It look towards the technical features of mobile devices that has brought on these security issues. The articles was useful to me as it discussed the Goals, Vectors and Malware types of a mobile attack, this gave me a great understanding of why mobile devices are being targeted and how their being targeted. The article went on to focus on the security architectures and features of the various OS's, detailing pitfalls in their architectures. The article provided key terms relating to types of attacks that will be useful when it comes to writing my lit review.

A Survey on Security for Mobile Devices (Polla & Martinelli & Sgandurra, 2013)
This article discusses the threats/risks faced to mobile devices, and key differences between Desktops and mobiles and why this makes mobiles much more attractive to an attacker. The articles is useful to me as it provides key figures and terms relating to mobile malware. It focus's on new threats and current threats and shows why smart phones are being targeted and the potential risks that could occur from these attacks. It puts into notion the different types of data that a smartphone could hold and the implications of this data being leaked.

Vetting Mobile Apps (Quirolgico & Voas & Kuhn, 2013)
This Article focus's on the types of vulnerabilities that a mobile app could have, it also discusses in great depth a process for Vetting mobile applications. It discusses a process whereby security personal should be involved from the beginning of the process right through to the launch of the app., with security personal being used to produce threat analysis documents and testing the application using static or dynamic vulnerability analysis. The article was very useful to me as it discusses the challenges faces in vetting applications but also why its so important that applications do it and not leave it to the limited vetting process provided by the app stores. The article also provided some key terms and has backed up a lot of the information I had previous discovered.

Android Architecture: Attacking the weak points (Mansfiled-Devine, 2012)
The article focus's on the weak points of Android Architecture, it looks into why Android is being targeted by malicious developers and ways that they are targeting it. The main new points that appeared with the article was a discussion on attacks using advertising in applications. It discussed why users wouldn't want to use apples advertising campaign iAd to launch malicious attacks due to a $300,000 sign on fee and apple insisting on verifying your identity, whereby googles adMob is the much more preferred due to it's $50 sign on fee and no background check. The article also focus's on applications and the permission they request, and puts forth the notion that application developers often make an app ask for permission it doesn't need just in case it might. The article provides key figures I can use in my lit review.

Privacy and Security Benefits of Jailbreaking iOS (Dimitrov & Chow, 2013)
This article dicusses why people should be jailbreaking their iPhones. It was extremely useful to me as it showed some of the positives of Jailbreaking iPhones by showing some of the features available to someone who does this. But i feel that their argument was flawed, the article is very one sided and a little oblivious at some times, while there are positives and there are new features available i don't feel that everyone would use their jailbroken iPhones to understand more about the iOS infrastructure.

A Risk Assessment Method for Smartphones (Theoharidou & Myloans & Gritzalis, 2012)
This article presents a newish method for risk assessing smartphones as a single entity. It looks into areas of Smartphone architecture, the types of data on the phone, the various events that could happen to your data and how that would effect you. This was a useful article for understanding how the risk assessment process works, and it gave great ideas as to what types of assets there are on a phone. It also gave me the idea of designing a 5 item likert scale for my meetings this week to have the interviewees rate the types of attacks that could occur on a smartphone.


Key Points/Trends within the Articles

·        Mobile applications are must more vulnerable to desktop applications because of the specifications of the mobile device, a mobile device has limited memory and battery which may mean it is susceptible to buffer overflow attacks and Denial of Service. A mobile device can also connect to a wide variety of networks (3G/4G, Wi-Fi (WLANs), GPRS/UMTS, Bluetooth (PAN)) and because of this it makes it much more susceptible to attacks than a Desktop application.

Applications may contain malware written in by the developer to cause harm to the device but most likely the application is the malware itself, the application may be secretly sending information to a 3rd party server without the user knowing via a permission granted to it by the user.

Mobile app stores have testing procedures in place (apple runs static scans and googles bouncer runs dymanic scans) but due to the amount of applications they have being submitted to them on a daily basis, they can't do in depth testing that is required to test all of the possible areas an app could be vulnerable. The testing procedures also have known vulnerabilities, Bouncer only scans a program for 5 minutes, therefore if an app is idle for 5 minutes and no malicious activity occurs then the app will be allowed onto the Google play store.

Mobile application vetting is a necessary process that should be implemented by Companies creating their own applications. Vetting apps is a process that starts at the beginning of the Software development lifecycle. It should start with a security assessment and threat analysis, and code should then be provided to security professionals to test as soon as possible. The tests should encompass both dynamic and static scanning. The challenge with app vetting is finding professionals who have the necessary skills to analyse and understand the report produced by the vulnerability scanner.

iOS has been shown through the article to be the more secure of the Operating systems, this is due to its walled garden approach whereby only apple devices can run iOS because the OS relys heavily on the system its running on. Apple also has a much more stringent policy on app scanning and is much quicker than Android at removing malicious apps that get past its vetting process. Apple devices don't  allow applications from any other market than it's own official app store, the same can't be said with Android or from jailbroken/rooted devices. Both operating systems work on a permission based access model. A user has to grant access to an application and the permission it needs before it can be installed. The problem with this approach is that most users don't understand why an application wouldn't need permission for a specific feature, and therefore wouldn't realise that an app could be using this feature for malicious activity.

The reasons why and why not to jailbreak/root your device has become apparent through analysis of my trusted sources. There are many reasons why and cool features that computing professional would go crazy for, but by jailbreaking a device you are breaking the contract you have with your handset provider and neutralising all the defences the OS provides. Now for an IT professional this wouldn't be a problem as they would understand what defences they would need to enable and customise, but a normal non-IT professional wouldn't understand half of the new features provided and therefore would be welcoming an attacker to exploit them. The research also showed that most malicious activity that has occurred on a device has come from that device being rooted/jailbroken.

These were just a few of the Key points i found when analysing my trusted sources, as i said in the beginning the key points will continue to grow as i analyse more and more articles.

The next article will include my revised research questions.

Thank you very much for reading!! Stayed tune for more. You Stay Classy Bournemouth.

Sunday, 2 March 2014

Design Method

I've not posted for a week due to a few social days and the list of articles for me to analyse constantly growing. This weeks post is all about the Design methodology i've chosen to follow when creating my artefact and a quick update on what i've been up to and whats coming up.

The design methodology i've chosen to follow is user-centered design. This is a process where the needs, wants and limitations of the end users of a process are considered throughout each stage of the design process.
The reason i've chosen this process is because the project has to match the needs of the team i'm creating it for and throughout the processing i will be relying on their knowledge and expertise to help build the artefact. This is an iterative process which is another reason i choose it because the artefact will need to be refined a few times before the team accept it as part of their policy, so i needed a process that went full circle.

What i've been doing this week is analysing every article i've come across that is relevant. the analysis include taking notes on every article and summarising the article into key points, i'm also noting down how article helps me and why it's useful to me. When this is finished I will start my Lit review using all of the notes i've gathered.

This week and next week I have my data collection interviews at the company, so i've been preparing for them by creating semi-structured interviews with questions that will sway the conversation towards the information I need.

Short and sharp this week, more soon to follow.

Thank you very much for reading!! Stayed tune for more. You Stay Classy Bournemouth.

Wednesday, 19 February 2014

Who Can I Trust?

Ongoing Aims
  1. Install and try out Vulnerable Mobile Applications
  2. Find papers and start Lit Review - Started
  3. Plan Introduction - Started
  4. Gather Questions to Fuel Research - Completed
  5. Analyse trusted sources - partially completed
--------------------------------------------------------------------------------------------------------------------------

Todays blog is all about the analysis of the trusted journals i've collected and why I trust them and what they information they can provide me. The articles have been split into categories regarding my research questions. The categories are:

  1. Mobile Application Security
  2. Android
  3. iOS
  4. Risk Assessment
  5. Mobile Protection
By the side of each article title i will put numbers of the categories the article relates to.

1. Journal Articles - Emerging Threats from a Mobile Platform - 1,2,3
Journal - MIPRO
Year - 2011
Brief Description - Provides an overview of the challenges and threats to mobile platforms. The articles focus's on iOS, Android and Symbian mobile devices. Also reviews the similarities between Mobile and desktop malware.
Cited - 2
URL - http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5967292
- This journal is trusted because it was used during an international conference on IT Security, the authors also all work at respectable establishments, such as various universities.

2. Journal Article - A Survey On Security for Mobile devices - 1

Journal - Communications Surveys & Tutorials, IEEE
Year - 2013
Brief Description - The paper surveys the state of art threats, vulnerabilities and solutions of mobile devices from 2004-2011.
Cited - N/A
URL - http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6170530

- This journal is trusted because the authors are both from respectable companies, e.g. telefonica, and would be able to get access to the data required to come to a trusted and accepted solution. It was also posted in a Journal that was created by IEEE which was published very recently.

3. Journal Article - Mobile Security: A look ahead - 1,2,3,5

Journal - Security & Privacy, IEEE
Year - 2013
Brief Description - This article reviews the challenges faces by employee owned mobile devices and compares iOS and Android security solutions. It also takes a look at various security solutions, some of which are application based and some are through the use of IDS's
Cited - N/A
URL -http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6427812

- Also the citing wasn't available for this article i feel is still extremely trustworthy as the authors are both from prestigious backgrounds and have written other articles in areas similar to this. The article was also published in a journal all about security and privacy which means it had to beat of some heavy competition to get into the journal.


4. Journal Article - Vetting Mobile Apps - 1,2,3

Journal - IT Professional
Year - 2011
Brief Description - Talks about why vetting mobile applications from 3rd parties is so important and discusses various vetting techniques.
Cited - 1
URL -http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5960018

- I feel that due to the authors and that it was in a Journal all about insecure IT that the source is trusted. The authors work at the national institute for Technology.


5. Report - Symantec International Security Threat Report - 1,5
Year - 2011
Brief Description - Report focusing on Threats from a range of devices, and focus's on threats from mobile devices. Provides lots of key figures.
Cited - N/A
URL - http://book.itep.ru/depository/security/symantec/Symantec%20-%20April%202011%20threat%20report.pdf

- This source is trusted because it is from one of the largest IT Security companies in the world, the used a wide sample for all of the key figures which proves the information can be trusted.


6. Journal Article - Android Architecture: Attacking the weak points - 2

Journal - Network Security
Year - 2012
Brief Description - This article talks about threats posed to android devices and why there so insecure.
Cited - 4
URL - http://www.sciencedirect.com/science/article/pii/S1353485812700922

- This article was written by a freelance journalist who specialises in Information Security. He produces a lot of respected journals which have been cited several times.

7. Journal Article - Android Malware and Mitigation - 2
Journal - 2012
Year - 2012
Brief Description - This article focus's on Malware attacks on Android devices and the mitigation techniques available
Cited - 2
URL - http://www.sciencedirect.com/science/article/pii/S1353485812701046

- This article was written by a freelance journalist who specialises in Information Security. He produces a lot of respected journals which have been cited several times.

Other Trusted Resources Include:

  • FOD Security user guide - Manual for tool used by the application security team
  • FOD mobile security review for the company - outlines the processes provided to the company by their 3rd part application testers
  • Software Security: Building Security In, Gary McGraw - Gary's book on application security.
So far i've gathered a wide variety of trusted resources, but only in certain area. I need to focus and find more in the areas of iOS, Risk assessment and mobile protection. I'll be looking into design policies, frameworks for risk assessment and various protection mechanisms over the next few days.


Thank you very much for reading!! Stayed tune for more. You Stay Classy Bournemouth.

Fuelling the Research

Ongoing Aims
  1. Install and try out Vulnerable Mobile Applications
  2. Find papers and start Lit Review - Started
  3. Plan Introduction - Started
  4. Gather Questions to Fuel Research
  5. Analyse trusted sources
--------------------------------------------------------------------------------------------------------------------------

Todays blog entry will focus on the questions that will help fuel my research for my Lit Review and why they will be vital to my lit review, and it will also contain analysis on the trusted sources i have at hand that are people I can use and can lend knowledge to me during my project.

Research Questions
1. What are the main threats to mobile security?
The first questions is focused on Mobile application security and the threats posed to this area. This research will focus on general mobile security, the leap from Desktop to Mobile and the main exploit and vulnerabilities in mobile devices.

2. Which platform is the most secure iOS or Android?
This second question will delve into specifics of which platform is the most vulnerable and why? It will also look briefly at larger mobile devices such as iPads and tablets. This will help my artefact design as it will allow me to assess applications based on which OS there going to be launched on, as the team will want to more thoroughly test an application that is on a more vulnerable OS.

3. What are the most effective ways to perform application risk assessments? Are there any frameworks to follow?
This question will delve into general risk assessment. It will look at various frameworks and the ways other companies have performed risk assessments. At the end of this research i'll have a chosen framework to follow and some key areas to assess the applications.

4. What is Architecture level risk analysis (ARA)? How is it best to perform this process?
This question is for me to gain a greater insight into the area of ARA. by the end of this research i'll know how the process works, how to design a risk assessment using ARA and the benefits that this will give.

5. What protection is there for mobile devices at application level? And non-application level?
This question will focus me on mobile protection and the kind of protection the apps at the company should have. This will look into areas like secure coding, jailbroken devices etc. By the end of this research i'll have some more areas to assess the risk level of the application by.

Human Trusted Sources
1. Ollie Green - Myself
I feel i'm a trusted resource as i have 3 years of forensic computing at university under my belt. I am a 1st class student who has over a year and half's experience at two FTSE 100 companies. I worked in IT Risk at GE Capital for a year where i performed various risk assessments and gained a large amount of knowledge into IT Risk. I worked at the company i'm currently doing this project for for 3 months where i was in the application security team and gained a lot of knowledge into application vulnerabilities and protection.

2. Michael Jones - Project Tutor
Mike is a trusted resources as he has years of experience lecturing in the field of forensic computing and before that worked as a consultant for lots of different companies and has a lot of experience in IT security. During the project Mike will be there to provide hints and tips and feedback on various drafts.

3. S.G. - Application Security Analyst
SG is a recent graduate of IS stream at this company which takes 2 years, and has been in the application security team for almost 2 years. He has a great wealth of knowledge in the area of IT security and application security which he has learned throughout his 4 years at the company. He also has recently gained an IT security qualification and has become a certified penetration tester. Stephen will be my main contact and stakeholder throughout the duration of my project and will act as the expert of mobile applications for use externally (public facing)

4. D.K. - Application  Security Analyst
DK has been a member of the application security team for over a year, and before that has moved throughout various roles aimed at quality assurance and testing within the company. He has a lot of knowledge within the area of mobile security and will act as my expert of mobile applications used internal (engineer apps). Holds same qualification as SG.

5. R.N. - Application Security Manager
RN has been manager of the application security team for over 3 years. Previous experience involves work at Oracle and other roles within the company. RN will act as one of the main stakeholders and will provide feedback on the artefact. Holds same qualification as SG.

6. P.P. - Quality Assurance and Control Manger
PP manager several teams, one of them being the Application Security team, he has a wide area of knowledge within IS and has been at the company for over 15 years. PP will act as one of the main stakeholders and will provide feedback and guide dance on the artefact.

7. Gary McGraw - Expert on ARA
Gary McGraw is a resident expert in Mobile Security and more specifically ARA to which is the author of a book called Software Security: Building it in, where it talks about how vital ARA is to software security. Gary McGraw is a trusted source due to his many years within the business of IT Security and his current role as CTO for Citigal, he has written a lot of books and is quite of the keynote speaker at HP's Enterprise security conferences. I won't have Gary on hand during the project but I do has a copy of his book and lots of videos of his key note speeches in which ARA focuses heavily.

So this is all of my Human trusted sources and research questions.
The next blog will feature a quick analysis of the other trusted sources i've already gathered, these sources are all Journal Articles and Books to be used for my Literature Review.

Thank you very much for reading!! Stayed tune for more. You Stay Classy Bournemouth.

Contact Info:

Tuesday, 18 February 2014

Laying the foundations

Ongoing Aims
  1. Install and try out Vulnerable Mobile Applications
  2. Find papers and start Lit Review - Started
  3. Decide on Research method for final pathway - Completed
  4. Plan Introduction - Started
  5. Create Basic Dissertation Layout - Completed
--------------------------------------------------------------------------------------------------------------------------

It's been a while since my last blog as Friday was my birthday and the celebrations went on all weekend. This blog revolves around the work completed yesterday and today.

Yesterday I was very focused on laying the foundations for my dissertation. By reading through past dissertations and looking at the structures theirs took i was able to lay the foundations for my dissertation and plan out various sections.

The main sections planned out and given headers were the Introduction and Lit Review.
The introduction was split into:
  • Problem Statement
  • Project Scope
  • Intended Audience
  • Project Objectives
  • Why the project is honours worthy
Today and tomorrow will be spent bullet pointing out key points that i feel should be included in these sections. This will help when it comes to writing as it'll act as a reminder to any thoughts i had early on.

The Lit review was split into a few sections which need to be discussed with my project tutor:
  • Mobile Application Security
    • This section will be used to give an overview on mobile application security, and vulnerabilities that occur in mobile devices. there will also be a brief section discussing android vs iOS vs Windows mobile in which the various benefits and disadvantages of the platforms are outlined
  • Risk Analysis
    • This section will focus on how to perform a risk analysis, it will also have a sub section on Architecture level risk analysis. I will take a look at various risk frameworks and see if they can be incorporated in my paper.
  • Mobile Protection
    • This section will discuss various techniques for securing mobile platforms. Most of the protection will be application based, but i'll also go into some detail regarding other ways of non app based security.
These sections and sub sections need to be agreed upon with my tutor, but until they are i've spent today gathering various articles and journals on all areas covered in the lit review. To gather the articles and store their references i've used End Note basic. End note was an application I hadn't previously used before so i spent some of today learning how to use it's interface and how to import references from various websites such as science direct and google scholar. 

The articles i've gathered so far have been grouped used a function within end note, the articles are grouped using the sections and sub sections of the lit review. I did this so when it comes to writing the lit review I won't have to sift through all of my articles to find the one i need, i'll only have to look through a set few, so findings quotes and referencing will be much easier as i'll know the category i wish to make a point about so i can find a quote much easier.

On going work with the articles is my analysis of them as my trusted sources. At the moment I have around 9 articles and 5 trusted people that will all be used as my trusted sources. As i read through my articles this list will continue to grow until i have a healthy amount of articles.  By Thursday I will hopefully have a completed list of trusted sources that have been analysed ready for my meeting with my project tutor.

The only articles i haven't gathered yet are ones specific to research methods, this will be completed by friday and i'll be able to start my lit review this weekend.

Thank you very much for reading!! Stayed tune for more. You Stay Classy Bournemouth.

Contact Info:

Thursday, 13 February 2014

Goals upon Goals

Aims For This Week
  1. Install and try out Vulnerable Mobile Applications
  2. Find papers and start Lit Review
  3. Choose a Final Pathway - Completed
  4. Decide on Research method for final pathway
  5. Plan Introduction
--------------------------------------------------------------------------------------------------------------------------

Since my last blog i've been doing some research into academic articles around ARA, Mobile risk assessment and mobile vulnerabilities but all that research will come together in a blog over the next few days.

Today's blog is all about me setting myself some goals. The reason i'm setting myself these goals is because i'm a very goal oriented person who needs to have a deadline to aim for otherwise I'll keep putting the work off, so therefore by aiming for a deadline i can make sure i'm always on target!

Goal 1 - 20th Feb Plan and flesh out introduction
The output of this goal will be to have a planned introduction with various bullet points which when I come to writing the main body will easily be fleshed out into complete sentences. I'll also have my project Aims and Objectives written therefore i'll show that from the beginning i knew what my intended output was.

Goal 2 - 24th Feb Plan out Interviews
This goal is for me to have all my interviews planned out and memorised, i'll also run them past my dissertation tutor to see if there is anything I've missed. To plan out the interviews i'll have to conduct further research into interview techniques to make sure there as professional as possible.

Goal 3 - 28th Feb Majority of Literature Review written
This goal is for me to make sure i'm proceeding quickly and effectively with my Literature review. To complete this goal i'll need to have a set of academic papers that i will be using in my review. By making sure I get the majority of it finished by February 28th I can then make sure it makes sense and flows from point to point.

Goal 4 - 6th Mar Conduct and Analyse all Interviews
In the first week of March I want to make sure all my interviews have been completed and are ready for me to analyse right away. I'll be analysing the interviews right away because that way the interview is still fresh in my mind and I'll be able to provide a lot of details on gesture and body movements.

Goal 5 - 9th Mar Plan and Start writing artefact
Once all the analysis has been completed I will start planning and then writing the artefact right after the interviews. I want to start writing the artefacts as early as possible because it will require feedback from my colleagues so I want as much time as possible for any changes that may need to be made.

Other Goals

  • April 10th - Draft Artefact Completed and submitted for feedback
  • April 15th - Draft Main body dissertation completed
  • April 25th - Final Artefact Completed and presented to colleagues for final feedback

Over the next few days as well as aiming to complete my goals, I will be producing a Gantt chart with detail on what areas i'm looking at, when certain research should be completed, etc. I feel that this will be able to provide a detailed look into my inner thinking and the time scale i'm looking at for my project.


Thank you very much for reading!! Stayed tune for more. You Stay Classy Bournemouth.

Contact Info: