對各種機密信息處理不當,如客戶密碼或社會保障號碼,會危及到用戶的個人隱私,通常這是一種非法行為。
Privacy Violation 會在以下情況下發生:
1. 用戶私人信息進入了程序。
2. 數據被寫到了一個外部介質,例如控制臺、file system 或網絡。
例 1:下列代碼用 Android 的 SharedPreferences 類存儲用戶首選項。在存儲的其他值中,用戶提供的 password 以明文形式存儲在設備上。
SharedPreferences userPreferences = this.getSharedPreferences("userPreferences", MODE_WORLD_READABLE);
SharedPreferences.Editor editor = userPreferences.editor();
editor.putString("username", userName);
editor.putString("password", password);
...
editor.language("language", language);
...
SharedPreferences 為應用程序專用,其他應用程序無法訪問。但是對設備的物理訪問還是有可能訪問這些文件。再者,在以上示例中,如果將模式設為 MODE_WORLD_READABLE,則會使首選項文件被其他應用程序訪問,更加違反了用戶隱私。[1] Standards Mapping - OWASP Top 10 2007 - (OWASP 2007) A6 Information Leakage and Improper Error Handling
[2] Standards Mapping - OWASP Top 10 2004 - (OWASP 2004) A8 Insecure Storage
[3] J. Oates AOL man pleads guilty to selling 92m email addies The Register
[4] Standards Mapping - Security Technical Implementation Guide Version 3 - (STIG 3) APP3210.1 CAT II, APP3310 CAT I, APP3340 CAT I
[5] Standards Mapping - Security Technical Implementation Guide Version 3.4 - (STIG 3.4) APP3210.1 CAT II, APP3310 CAT I, APP3340 CAT I
[6] California SB-1386 Government of the State of California
[7] Standards Mapping - Common Weakness Enumeration - (CWE) CWE ID 359
[8] Designing for Security Android
[9] Financial Privacy:The Gramm-Leach Bliley Act (GLBA) Federal Trade Commission
[10] Health Insurance Portability and Accountability Act (HIPAA) U.S. Department of Human Services
[11] Standards Mapping - Web Application Security Consortium 24 + 2 - (WASC 24 + 2) Information Leakage
[12] OWASP Top 10 Mobile Risks OWASP
[13] Privacy Initiatives U.S. Federal Trade Commission
[14] Standards Mapping - Payment Card Industry Data Security Standard Version 2.0 - (PCI 2.0) Requirement 3.2, Requirement 3.4, Requirement 4.2, Requirement 6.5.5, Requirement 8.4
[15] Standards Mapping - Payment Card Industry Data Security Standard Version 1.2 - (PCI 1.2) Requirement 3.2, Requirement 3.4, Requirement 4.2, Requirement 6.5.6, Requirement 8.4
[16] Standards Mapping - Payment Card Industry Data Security Standard Version 1.1 - (PCI 1.1) Requirement 3.2, Requirement 3.4, Requirement 4.2, Requirement 8.4
[17] Safe Harbor Privacy Framework U.S. Department of Commerce
[18] M. Howard, D. LeBlanc Writing Secure Code, Second Edition Microsoft Press