Statements (25)
Predicate | Object |
---|---|
gptkbp:instanceOf |
crypt
|
gptkbp:category |
mobile security
|
gptkbp:contains |
M10: Extraneous Functionality
M1: Improper Credential Usage M2: Insecure Data Storage M3: Insecure Communication M4: Insecure Authentication M5: Insufficient Cryptography M6: Insecure Authorization M7: Client Code Quality M8: Code Tampering M9: Reverse Engineering |
gptkbp:firstPublished |
2014
|
gptkbp:focusesOn |
mobile application security
|
https://www.w3.org/2000/01/rdf-schema#label |
OWASP Mobile Top 10
|
gptkbp:language |
English
|
gptkbp:latestReleaseVersion |
2023
|
gptkbp:maintainedBy |
gptkb:OWASP
|
gptkbp:usedBy |
security professionals
mobile app developers |
gptkbp:usedFor |
risk assessment
security best practices |
gptkbp:website |
https://owasp.org/www-project-mobile-top-10/
|
gptkbp:bfsParent |
gptkb:OWASP_Top_10
|
gptkbp:bfsLayer |
6
|