Statements (26)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:crypt
|
| gptkbp:category |
mobile security
|
| gptkbp:contains |
M10: Extraneous Functionality
M1: Improper Credential Usage M2: Insecure Data Storage M3: Insecure Communication M4: Insecure Authentication M5: Insufficient Cryptography M6: Insecure Authorization M7: Client Code Quality M8: Code Tampering M9: Reverse Engineering |
| gptkbp:firstPublished |
2014
|
| gptkbp:focusesOn |
mobile application security
|
| gptkbp:language |
English
|
| gptkbp:latestReleaseVersion |
2023
|
| gptkbp:maintainedBy |
gptkb:OWASP
|
| gptkbp:usedBy |
security professionals
mobile app developers |
| gptkbp:usedFor |
risk assessment
security best practices |
| gptkbp:website |
https://owasp.org/www-project-mobile-top-10/
|
| gptkbp:bfsParent |
gptkb:OWASP_Mobile_Security_Project
gptkb:OWASP_Top_10 |
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
OWASP Mobile Top 10
|