Page 26 - ITU-T Focus Group Digital Financial Services – Technology, innovation and competition
P. 26

ITU-T Focus Group Digital Financial Services
                                              Technology, Innovation and Competition



               Authentication

               Poor or non-existent user authentication is a major risk in mobile devices. Users should be encouraged to
               enable device authentication, including device PINs, gesture locks, and/or biometric authentication, and
               carriers should provide devices that include these features (this is especially important for feature phones).


               Non-repudiation

               Without adequate logging mechanisms, including capturing the provenance of user actions or logging of critical
               actions into tamper-proof storage, it can be difficult to audit systems after the fact to establish culpability of
               actions. Without the use of digital signatures attached to actions, particularly those that arrive over a network
               connection, non-repudiation is not possible.


               Data confidentiality

               Applications are often reliant on security libraries offered by the operating system – this is the preferred practice
               to applications designing their own cryptography. Hence, it becomes particularly important to ensure that
               these libraries are correctly designed and implemented and that the cipher suites they support are sufficiently
               strong. The Heartbleed bug [5] was an example of a large-scale reliance on a security library that had been
               found to contain a long-lived security vulnerability, potentially compromising confidentiality of tens of millions
               of devices including smartphones.


               Communication security
               Support for encryption across network connections may be provided through libraries within the operating
               system. It is critical to ensure that such libraries remain updated to prevent attacks against encryption ciphers
               that can compromise confidentiality. Such attacks such as Heartbleed and POODLE have already been seen
               in commodity operating systems.


               Data integrity
               Similar to issues with communication security, it is vital that cryptographic libraries be updated in response to
               attacks against underlying cryptosystems and that applications are linked to these updated libraries, in order
               to support data integrity.


               Availability

               A major concern for mobile operating systems is the threat of malware or other offensive code that can be
               wielded by an attacker, as well as insufficient protection against malformed input. Such malicious input can
               potentially lead to buffer overflows or other exploits in the operating system, which can cause applications
               and other services to crash, denying access for the DFS app to contact the external network.


               Privacy
               User privacy can be compromised by attacks such as phishing, which is often the first activity in advance of an
               advanced persistent threat (APT) that can lead to larger scale compromise. Attacks against operating systems
               have been numerous and virulent, from malware and privacy-compromising advertising to ransomware and
               targeted zero-day attacks.


               Recommendations for mitigation
               R6 – Regular security updates are critical to ensure that mobile operating systems running on user devices
               operate using the latest security patches. This is a means of protecting users against recently developed





                12
   21   22   23   24   25   26   27   28   29   30   31