• No results found

Android Mobile Banking. How secure are mobile banking apps on the world's most popular smartphone

N/A
N/A
Protected

Academic year: 2021

Share "Android Mobile Banking. How secure are mobile banking apps on the world's most popular smartphone"

Copied!
23
0
0

Loading.... (view fulltext now)

Full text

(1)

Android Mobile Banking

How secure are mobile banking apps on the world's most popular smartphone

operating system? operating system?

(2)

The material appearing in this presentation is for informational purposes pp g p p p only and is not legal or accounting advice. Communication of this 

information is not intended to create, and receipt does not constitute, a  legal relationship including but not limited to an accountant client legal relationship, including, but not limited to, an accountant‐client  relationship. Although these materials may have been prepared by  professionals, they should not be used as a substitute for professional  services. If legal, accounting, or other professional advice is required, the  services of a professional should be sought. 

(3)

PRESENTERS

Bob Grill IT Consulting Manager M Ad LLP Moss Adams LLP David Dyky IT Consulting Manager

(4)

AGENDA

• Mobile Banking Trends • Android Platform Basics • Android Mobile Banking Security  Considerations • Questions and Answers

(5)

MOBILE BANKING TRENDS

AGENDA TOPIC:

(6)

THE GROWTH OF MOBILE COMPUTING

• 91% of Americans use a mobile phone  • As of Christmas 2011, 50% of Americans will  have a smart phone. • By 2013, mobile phones will overtake PCs as  the most common web access device  worldwide. Sources: http://www.gartner.com/it/page.jsp?id=1278413 http://arstechnica.com/telecom/news/2010/03/wireless‐survey‐91‐of‐americans‐have‐cell‐phones.ars

(7)

MOBILE BANKING TRENDS:

MOBILE BANKING TRENDS:

SMARTPHONE APPS

• Richer features 

and better user  interface when  compared to SMS  and WAP channels and WAP channels

• Two dominant 

platforms: iOS platforms:  iOS  and Android

(8)

MOBILE BANKING TRENDS:

MOBILE BANKING TRENDS:

MOBILE REMOTE DEPOSIT CAPTURE

• Emerging market  expectation for community  banks and credit unions to  adopt K d b i i • Key vendors beginning to  offer photo bill pay F f l t ti • Focus of regulatory scrutiny  on consumer compliance  and security risks

(9)

MOBILE BANKING TRENDS:

MOBILE BANKING TRENDS:

MOBILE REMOTE DEPOSIT CAPTURE (2)

• Several key requirements for RDC risk  management from regulators (FIL‐4‐2009) • Regulator concern with: • Risk assessment  • Multi‐factor authentication • Customer awareness education • Deposit thresholds

(10)

MOBILE BANKING TRENDS:

MOBILE BANKING TRENDS:

PERSON TO PERSON PAYMENTS

• Payments outside of the  institution, seen as an  t it t b ild b d opportunity to build brand  recognition and leverage  existing customers existing customers • Competition among FI service  providers (e.g., FiServ, Q2) and  Internet players (e.g., Paypal,  Square, American Express  Serve Google Checkout) Serve, Google Checkout)

(11)

MOBILE BANKING TRENDS:

MOBILE BANKING TRENDS:

PERSONAL FINANCIAL MANAGEMENT

• Mimics functionality of  consumer‐branded solutions  such as Mint.com or Yodlee • Often includes customizable  l alerts • Defensive move to retain  t i t ti d customer interactions and  relationship

(12)

ANDROID PLATFORM BASICS

AGENDA TOPIC:

(13)
(14)

ANDROID OPERATING SYSTEM

• Open Source – Source code is available to read  by anyone, based on Linux. A d id d l i ll d b • Android development is controlled by a group  called the Open Handset Alliance – mostly run  by Google, but many cell phone manufacturers by Google, but many cell phone manufacturers  are members.

• Unlike the iPhone, the Android platform is more 

open to customization by device manufacturers  and users, and therefore security 

considerations become more complex considerations become more complex. 

(15)
(16)

ANDROID SECURITY CONTROLS

• Applications run inside a Virtual Machine (VM)  – one app should not know what other apps are  running on the phone • Each VM is limited to communications with  i id d b G l operating system programs provided by Google • Applications can override this control if given  i i permission

(17)

ANDROID MOBILE BANKING SECURITY

AGENDA TOPIC:

ANDROID MOBILE BANKING SECURITY

CONSIDERATIONS

(18)

ANDROID APP MARKETPLACES

• The Google Play marketplace is the primary app store.  Other stores from carriers (Verizon) and third parties  (Amazon.com) also exist.  Financial institutions can  di t ib t th h f th h l distribute apps through any of these channels. • Marketplaces maintain basic controls over apps  distributed:  d d o Automated source code review o Marketplaces maintain basic controls over apps distributed • Each app is digitally signed by the developer.  The 

operating s stem restricts pdates to onl those signed operating system restricts updates to only those signed  by the same developer.  Therefore,  Internet banking  vendors must maintain strict controls over the digital  keys used to sign the app to prevent it from being used keys used to sign the app, to prevent it from being used  for unauthorized app updates.

(19)

APP PERMISSIONS

• App permissions are used to  control what resources each  Android app can access. • Minimize the permissions an  i d i i i app uses, in order to minimize  the consequences of potential  security vulnerabilities in the security vulnerabilities in the  application.

(20)

ANDROID MOBILE BANKING:

ANDROID MOBILE BANKING:

AUTHENTICATION

• “Layered Security” to  comply with FIL‐50‐2011 M i i i b l • Many institutions balance  risk by limiting money  movement, using device movement, using device  identification and simple  user authentication (e.g.,  4 di it PIN) 4‐digit PIN) • Android can maintain an 

encrypted device identifier encrypted device identifier

(21)

STORING SENSITIVE DATA

• Sensitive data includes: o Device authentication information  o Cached balance and transaction histories • Sensitive data can be secured by encryption.  Developers need to call specific functions to  ensure that happens.

(22)

CONCLUDING RECOMMENDATIONS

• Promote security awareness for Internet  banking users that is platform specific • Perform due diligence and work with Internet  banking vendors to ensure that Android apps  h i i i d have appropriate security engineered • Ensure layered security controls are in place for  th ti ti t ti it i authentication, transaction monitoring, or  other controls (required by FFIEC FIL‐50‐2011)

(23)

QUESTIONS?

Bob Grill bob.grill@mossadams.com (916) 503 8127 (916) 503‐8127 David Dyk david.dyk@mossadams.com 503‐512‐0004 

References

Related documents

Whilst the hanging lamp was acquired from the Dome of the Rock and entered the Museum collection in 1887,17 according to the Benaki records the hanging ornament was purchased

Figure 4.12: ( left ) Depiction of film thickness at injector outlet and ( right ) comparison of total pressure between injector designs. Radial positions to the left of the

Living Heritage: Cultural Rights as Tools to Apprehend and Comprehend Cultu- ral Heritage from its Human Perspective World Heritage Sites and Conflict: A Case of Sukur

Interestingly, the M215 5.54 resonance shifted toward that in the β-arrestin 1-bound state upon phosphorylation (Fig. 5 ), suggesting that the phosphorylation-induced

This paper looks at the problems with the SMTP protocol which have contributed to spammers ability to send junk mail at a low cost while avoiding prosecution, and suggests

(11) เป็นผู้รับฝากเครื่องมือสื่อสารจากผู้มีสิทธิเสนอราคา คณะกรรมการประกวดราคา และบุคคลที่อยู่ในสถานที่เสนอราคา ( ห้องของผู้มีสิทธิเสนอราคาและห้องของ คณะกรรมการประกวดราคา )

This paper presents a study of using associative mem- ory learning techniques to directly compare network scans in order to create a classification which can be used by itself or

If you have defined code length as the verification mode ( Æ page 26), you must now define the number of characters to be verified (up to eleven characters long).