Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Stephen Quirolgico; Jeffrey M. Voas; Athanasios T. Karygiannis; Christoph Michael; Karen Scarfone;|
|Title:||Vetting the Security of Mobile Applications|
|Published:||January 26, 2015|
|Abstract:||The purpose of this document is to help organizations (1) understand the process for vetting the security of mobile applications, (2) plan for the implementation of an app vetting process, (3) develop app security requirements, (4) understand the types of app vulnerabilities and the testing methods used to detect those vulnerabilities, and (5) determine if an app is acceptable for deployment on the organization's mobile devices.|
|Citation:||Special Publication (NIST SP) - 800-163|
|Keywords:||app vetting, apps, malware, mobile devices, security requirements, security vetting, smartphones, software assurance, software security, software testing, software vetting|
|Research Areas:||Computer Security, Cybersecurity, Telcommunications/Wireless, Threats & Vulnerabilities, Information Technology|