aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMarcin Zelent <zelent.marcin@gmail.com>2018-05-17 12:48:13 +0200
committerMarcin Zelent <zelent.marcin@gmail.com>2018-05-17 12:48:13 +0200
commita1383ba6446240a20ff4856c743713c1cb5fccd4 (patch)
treeb64de0ae47c2cdaaa6e89ef3b5c302e52adc3302
parent1b433c36d9b43fd064bac44459ce4136bdbf562c (diff)
Finished importance of AppSec
-rw-r--r--synopsis.tex36
1 files changed, 33 insertions, 3 deletions
diff --git a/synopsis.tex b/synopsis.tex
index b70418d..8d49de1 100644
--- a/synopsis.tex
+++ b/synopsis.tex
@@ -167,9 +167,39 @@ without the knowledge of the account owner. The data could be sold on the black
market or published on the internet. It could be used to harass or blackmail the
unfortunate users. Attackers could also impersonate them and cause even more
problems. It could be especially dangerous when pretending to be a corporate
-worker as their actions could harm the entire business.
-
-
+worker as their actions could harm the entire business. Stealing blueprints,
+prototypes or early versions of unreleased products could bring massive
+losses of money and force changes of plans.
+
+Another issue is the possibility of gaining access to functionality reserved
+only for privileged users, such as moderators and administrators. It could allow
+not only for data theft, but also for damaging the system and stored
+information. It would allow for spreading viruses and malware throughout the
+whole platform, creating a botnet, spambots, mining cryptocurrencies and making
+it vulnerable to further attacks. It would be sufficient just to insert
+malicious code into the application and infest its users.
+
+Other, non-technical risks include the possible lost of trust from customers,
+who value privacy and wish their data to be secure. It could even lead to
+lawsuits, like it happened to Yahoo which got sued over security breaches that
+took place between 2013 and 2016. Private information of at least 3 billions
+users were exposed, it included names e-mail addresses, dates of birth,
+phone numbers, passwords, etc. It cost the company hundreds of millions of
+dollars and damaged the brand image permanently. On the other hand, providing
+good security could help in gaining new clients.
+
+In the wake of mobile and Internet of Things applications, security should be
+top priority for application developers. IoT creates many new risks that were
+never seen before. Since all of the devices are connected to the internet, they
+can be accessed by the hackers. It is a big threat to the privacy of their
+users, because they can be used to spy on them 24/7 by utilizing built-in
+camera, microphone or reading device activity and logs. This information could
+be used to blackmail the victims or even help in burglary. By knowing the
+victim's daily routine, the criminal could try to break in to the house when its
+owner is out. Moreover, he could exploit the "smart home" security system, since
+usually it is also connected to the network. Finally, the attacker could use the
+functionality of the compromised IoT devices in a bad way, for example making
+them use a lot of power, causing short circuit or even starting fire.
\section{Conclusion}