{"id":213,"date":"2015-04-26T21:00:08","date_gmt":"2015-04-26T21:00:08","guid":{"rendered":"http:\/\/blog.soton.ac.uk\/socialeyes\/?p=213"},"modified":"2015-04-27T13:04:39","modified_gmt":"2015-04-27T13:04:39","slug":"standards-and-guidelines-mobile-application-security","status":"publish","type":"post","link":"https:\/\/blog.soton.ac.uk\/socialeyes\/2015\/04\/26\/standards-and-guidelines-mobile-application-security\/","title":{"rendered":"Standards and Guidelines: Mobile Application Security"},"content":{"rendered":"<p>As the requirement for security of applications and their data becomes increasingly crucial to both developers and users, it became apparent to SCENE project team to implement a set of standard controls to avoid known security holes and reduce the risks of exploits in the application. <a href=\"https:\/\/www.owasp.org\/index.php\/Main_Page\">The Open Web Application Security Project <\/a>(OWASP) had developed a set of <a href=\"https:\/\/www.owasp.org\/index.php\/OWASP_Mobile_Security_Project#tab=Secure_Mobile_Development\">security guidelines<\/a> for Mobile Applications. The development team will be required to implement these controls in the app. The guidelines will also act as the basis for security testing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the requirement for security of applications and their data becomes increasingly crucial to both developers and users, it became apparent to SCENE project team to implement a set of standard controls to avoid known security holes and reduce the risks of exploits in the application. The Open Web Application Security Project (OWASP) had developed a set of security guidelines&#8230;<span class=\"path-read-more\"><a class=\"more-link\" href=\"https:\/\/blog.soton.ac.uk\/socialeyes\/2015\/04\/26\/standards-and-guidelines-mobile-application-security\/\" title=\"Standards and Guidelines: Mobile Application Security\">  Read more &rarr; <\/a><\/span><\/p>\n","protected":false},"author":97406,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[953496],"tags":[52869,463,8900],"class_list":["post-213","post","type-post","status-publish","format-standard","hentry","category-standards-and-guidelines","tag-guidelines","tag-security","tag-standards"],"_links":{"self":[{"href":"https:\/\/blog.soton.ac.uk\/socialeyes\/wp-json\/wp\/v2\/posts\/213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.soton.ac.uk\/socialeyes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.soton.ac.uk\/socialeyes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/socialeyes\/wp-json\/wp\/v2\/users\/97406"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/socialeyes\/wp-json\/wp\/v2\/comments?post=213"}],"version-history":[{"count":1,"href":"https:\/\/blog.soton.ac.uk\/socialeyes\/wp-json\/wp\/v2\/posts\/213\/revisions"}],"predecessor-version":[{"id":214,"href":"https:\/\/blog.soton.ac.uk\/socialeyes\/wp-json\/wp\/v2\/posts\/213\/revisions\/214"}],"wp:attachment":[{"href":"https:\/\/blog.soton.ac.uk\/socialeyes\/wp-json\/wp\/v2\/media?parent=213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/socialeyes\/wp-json\/wp\/v2\/categories?post=213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/socialeyes\/wp-json\/wp\/v2\/tags?post=213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}