Skip to main content

Android Security: Web Browsers and Email Applications

Mobile devices are popular communication tools that allow people to stay connected in most places at all times. Despite the varied proliferation of applications that can be installed on smartphones and tablets, web browsers and email applications are default applications that remain highly vulnerable if not properly addressed. This paper will compare several different mobile versions of these applications and use the E-mail and Web Browser Protections critical control to suggest ways to secure these end points.

37227 (PDF, 3.34MB)

29 Aug 2016
ByMarsha Miller
Share
All papers are copyrighted

No re-posting of papers is permitted

Related Content

SANS 2024 Multicloud Survey: Securing Multiple Clouds Amid Constant Changes

Research Paper

This white paper offers invaluable knowledge to help you navigate the complexities of securing...

  • 27 Aug 2024
  • Kenneth G. Hartman

Recover an RSA Private Key from a TLS v1.2 session

Research Paper

Cyberattacks happen every day.Most organizations have administrative and technical controls...

  • 22 Jun 2022

Recommendations for small/medium-sized businesses enabling incident response

Research Paper

Security incidents are inevitable. While large businesses can afford security teams to prepare and...

  • 17 Jan 2022

Are You Hitting the Mark with DMARC?

Research Paper

As organizations struggle to protect their end-users from email attacks despite pragmatic methods...

  • 12 Feb 2020

Practical implementation of the Australian Signals Directorate Essential Eight Maturity Model to Level Three within residential University colleges.

Research Paper

The Australian Signals Directorate (ASD) Essential Eight Maturity Model is a subset of the ASDs...

  • 21 Aug 2018

Privacy and the Internet of Things

Research Paper

The Internet of Things has gotten a lot of attention over the past year or so, and for good reason....

  • 25 Oct 2017

The Information We Seek

Research Paper

Whether you are performing a penetration test, conducting an investigation, or are skilled attackers...

  • 25 Oct 2016

Windows Installed Software Inventory

Research Paper

The 20 Critical Controls provide a guideline for the controls that need to be placed in our networks...

  • 7 Sep 2016
  • Jonathan Risto

Applying Machine Learning Techniques to Measure Critical Security Controls

Research Paper

Implementing and measuring Critical Security Controls (CSC) requires analyzing all data types...

  • 6 Sep 2016

Simple Approach to Access Control: Port Control and MAC Filtering

Research Paper

Many times businesses will spend time and money on 'Magic Bullet' security and focus on a single...

  • 22 Aug 2016

Generating Hypotheses for Successful Threat Hunting

Research Paper

Threat hunting is a proactive and iterative approach to detecting threats. Although threat hunters...

  • 15 Aug 2016
  • Robert M. Lee, David Bianco

Evaluating Cyber Risk in Engineering Environments: A Proposed Framework and Methodology

Research Paper

Evaluating Cyber Risk in Engineering Environments: A Proposed Framework and Methodology

  • 31 May 2016

Detecting a Targeted Data Breach with Ease: A SANS Product Review

Research Paper

A product review by Jake Williams. It examines LightCyber Magna, focusing on itseffectiveness in...

  • 21 Oct 2015
  • Jake Williams

Case Study: Critical Controls that Sony Should Have Implemented

Research Paper

On November 24, 2014, an incident almost pulled right out of a 90's hacker movie transformed into a...

  • 22 Jun 2015

The What, Where and How of Protecting Healthcare Data

Research Paper

Mitigating healthcare data-loss risk by understanding the What, Where, and How of Protecting...

  • 6 Apr 2015

Let's face it, you are probably compromised. What next?

Research Paper

Long live the operator! At a point in time, they were the backbone of the phone system, ensuring...

  • 15 Dec 2014

MalwareD: A study on network and host based defenses that prevent malware from accomplishing its goals.

Research Paper

This SANS survey report explores how widely the CSCs are being adopted, as well as what challenges...

  • 17 Sep 2014

Implementing Public Key Infrastructure (PKI) Using Microsoft Windows Server 2012 Certificate Services

Research Paper

Computers pose a risk to companies due to the nature of the information they store. Most...

  • 16 Sep 2014

Implementation and use of DNS RPZ in malware and phishing defence

Research Paper

There has been growing interest in the use of DNS RPZ (domain name system response policy zones) as...

  • 3 Apr 2014

Logging and Monitoring to Detect Network Intrusions and Compliance Violations in the Environment

Research Paper

Log Management and Intrusion Detection solutions have been evolving for years. Yet, it remains a...

  • 8 Aug 2012

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.