logo

Security, Privacy, and Data Sovereignty Issues in COVID Safe App

   

Added on  2023-01-06

7 Pages1881 Words27 Views
Assessment

Contents
INTRODUCTION.................................................................................................................................3
MAIN BODY........................................................................................................................................3
CONCLUSION.....................................................................................................................................6
REFERENCES......................................................................................................................................7

INTRODUCTION
The report is based on analysis of various kinds of issues related to security, location
and privacy. As well as these issues can impact to customers’ effectiveness in order to use the
COVID 19 safety application. In this report different kinds of issues are explained in a
detailed manner.
MAIN BODY
1. Discusses the possible threats and risks to the security of user data on mobile phones
and in linked Cloud and financial accounts from the use of the COVID Safe app.
Security issues:
Risk of Improper Session Handling- Many applications like COVID 19 safe apps
make use of "coupons" to promote ease-of-access for smart phone purchases, enabling
users to execute many acts without being asked to identify and authenticate their
identification (Kour, Karim and Tretten, 2019). Tokens are created by apps to
recognize and verify computers, much like credentials for apps. With each strategic
leadership, or "session," protected apps create new tokens that should stay private.
Inappropriate session management happens, as per the Manifest, when applications
inadvertently exchange session tokens, such as with malicious actors, enabling them
to imitate authorized customers.
Risk of financial accounts- This is also a risk which can be faced by users due to
various kinds of cyber attackers. The main cause of risk is that during usage of
applications, they add various kinds of information such as their email, mobile
number etc. these social accounts have linked with bank accounts. Due to which cyber
attackers can attack on the bank accounts and can stole the amount. Similar as in the
context of COVID 19 applications, there is risk of losing financial data due to lack of
security.
Risk of broken authentication- The identification of innovative to distort this data is
not taken by a remarkable number of apps and APIs. It's kept unencrypted, quickly
intercepted, in plain text (Kimani, Oduol and Langat, 2019). The material is often
immediately decrypted when recovered, which makes it much easier to copy / paste
outside of the device when combined with insertion flaws. Broken authentication is an

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
COVID 19 Safety Applications and Risks
|33
|2384
|78

Penetration Testing Penetration Testing
|52
|9148
|85

OWASP Vulnerabilities: Broken Authentication, Security Misconfiguration, Insufficient Logging & Monitoring
|10
|2534
|1

Contemporary World Application 2022
|10
|541
|10

OWASP TOP 10 | Web Application Security | Report
|10
|1533
|23

Cyber Security: Vulnerabilities, Exploitation, and Security Controls
|10
|2384
|453