An IS auditor is reviewing a banking mobile application that allows end users to perform financial transactions.
Which of the following poses a security risk to the organization?
Click on the arrows to vote for the correct answer
A. B. C. D.A.
An IS auditor is reviewing a banking mobile application that allows end users to perform financial transactions. The IS auditor is responsible for identifying potential security risks to the organization.
Out of the given options, the security risk that poses the greatest threat to the organization is unpatched security vulnerabilities in the mobile operating system. This is because an unpatched vulnerability can allow attackers to exploit the system, steal sensitive information, or carry out unauthorized transactions.
Option B, outdated mobile network settings, may also pose a risk to the organization, but it is not as critical as unpatched vulnerabilities. Outdated network settings could potentially expose the organization's data to unauthorized access, but this is typically a lower-risk scenario than a vulnerability in the mobile operating system.
Option C, application programming interface (API) logic faults, is also a potential security risk as it could allow attackers to access sensitive data or carry out unauthorized transactions. However, this risk is lower than unpatched vulnerabilities as it typically requires a higher level of expertise and access to the system.
Option D, lack of strong device passwords, is important for securing the mobile application and protecting user data. However, it is not as critical as unpatched vulnerabilities as a strong password alone cannot protect against exploitation of system-level vulnerabilities.
In conclusion, out of the given options, unpatched security vulnerabilities in the mobile operating system poses the greatest risk to the organization's security. The IS auditor should prioritize addressing this risk and recommend that the organization takes necessary measures to patch any vulnerabilities in the mobile operating system.