Summary
This chapter covered the basics of data security. We discussed the three core principles of data security, namely confidentiality, integrity, and availability. We walked through a sample application scenario and tried to chart out our assets, threats, and attack scenarios. We tried to assess the cost associated with a security breach. Our data storage options and the amount of time, effort, and money that we plan to spend on securing the data will depend on this analysis. We also reflected on the mobile ecosystem as a whole and what end-to-end security means in a mobile context. It is not hard to realize that we only control the applications that we write. We closed this chapter with the review of Android's DRM framework and available capability. With all this knowledge about data security, let's march to the next chapter and learn the different tools that an application developer can use to protect their users' data.