B2G App Security Model/Threat Model: Difference between revisions

Line 19: Line 19:
*Network Compromise
*Network Compromise
*Vulnerable Web App
*Vulnerable Web App
*Web Server Compromise
*App Host Compromise
*App Store Compromise
*Platform Vulnerabilities
*Platform Vulnerabilities
*Malicious Web App
*Malicious Web App
*UI Spoofing
*UI Spoofing
*Wrong permissions assigned to an App


These controls for these threats fall into two basic categories:
These controls for these threats fall into two basic categories:
canmove, Confirmed users
1,220

edits