The Android Developers Guide to 3 rd -Party SDK Assessment and Security
|
|
|
- Eugenia Peters
- 10 years ago
- Views:
Transcription
1 SESSION ID: MBS-F02 The Android Developers Guide to 3 rd -Party SDK Assessment and Security Yang Yang( 杨 德 志 ) Mobile Security Researcher and Developer, Trend Micro
2 Advantages of 3 rd -Party SDKs Speed up app development Are easy to use May be of good quality (at least for some) Generate profit! 2
3 Android Threat Growth As of March 2015, Trend Micro has collected more than 5.4M malicious and high-risk applications 3
4 67% of detected apps misuse or abuse 3 rd -party SDKs or use SDKs that are inherently risky 4
5 Malware/PUA Distribution by Country Majority of the apps that misuse or abuse 3 rd -party SDKs are from China 5
6 Malware/PUA Distribution by Category Of the detected apps, games have the highest percentage, as they usually contain both advertising SDKs as well as payment SDKs. 6
7 Most security issues have something to do with advertising and payment SDKs. Why? 7
8 Popular App Business Models/SDKs Advertisement Ad networks provide SDKs that allow developers to display advertisements Ad networks pay developers, usually based on the click rate Payment Users purchase additional features or services within the app Allows users a more direct way to pay app developers 8
9 Security Issues with Ad SDKs Privacy leaks Insecure app installation Dynamic code loading Mobile traffic cost 9
10 Privacy Leak 10
11 Insecure App Installation A special ad: Integral Wall Using app need virtual money The way to earn the virtual money Step 1: Click the ad to download the apps Step 2: Install them Step 3: Launch the downloaded apps for a few minutes 11
12 Dynamic Code Loading 12
13 Mobile traffic cost Download file before push ad File is too large 13
14 Security Issues in payment SDKs Send SMS (Short Message Service) message without users explicit consent E.g., user (or a child) hits the pay button by accident Confirmation as a step is necessary Block incoming SMS message Some payment SDKs can block the confirmation or notice SMS message User may not know that s/he is already paying for a service or item 14
15 Block incoming SMS 15
16 General Security Issues in 3 rd -Party SDKs 16
17 General Security Issues Vulnerabilities related Insecure network transmission Insecure online setting Insecure data storage Insecure data sharing 17
18 SDK impacted by OS vulnerability Android API WebView vulnerability (CVE ) 18
19 Insecure network transmission 19
20 Insecure online setting Apache Cordova vulnerability (CVE ) 20
21 Insecure data storage Insecure database Insecure sdcard storage 21
22 Insecure data sharing Android Content Provider Share your data with enough limitation 22
23 Best Practices 23
24 For SDK Developers and Providers Provide clear end-user license agreements (EULAs) Make the SDK document as clear as possible eg: Limit collection user information Add more limitations for exported interface Pay attention to vulnerabilities; provide updated SDKs as necessary Online control SDK logic is not recommended 24
25 For Mobile App Developers Read the SDK documents carefully Choose 3 rd -party SDKs carefully Avoid using the aggressive interface (APIs) When using ad SDKs, make sure that the apps do not push ads too frequently or impact other apps Update to the latest SDK versions Advise users if your app has aggressive behavior 25
26 Developers should pay attention to software security! Encrypt sensitive data Use packers to protect your applications Use high-risk app permissions with caution Push app or data updates app via the app store 26
27 Summary Ease of use and Profit 3 in 5 Android theats are caused by 3 rd -party SDKs Mobile security involves all aspects in the ecosystem, including SDK providers and app developers 27
28 Questions? 28
29 Thank You!
Download and Installation Instructions. Android SDK and Android Development Tools (ADT) Microsoft Windows
Download and Installation Instructions for Android SDK and Android Development Tools (ADT) on Microsoft Windows Updated May, 2012 This document will describe how to download and install the Android SDK
Studying Security Weaknesses of Android System
, pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced
Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption!
Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption Thisdocumentcontainsthenecessarystepstoencryptthecontentsofaharddrive usingbitlockerandwindows7. Thefollowinginstructionsarederivedfromdocumentationat:
Jordan Jozwiak November 13, 2011
Jordan Jozwiak November 13, 2011 Agenda Why Android? Application framework Getting started UI and widgets Application distribution External libraries Demo Why Android? Why Android? Open source That means
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP August 2014 RSA agents recently traced a threat actor advertising a mobile credit card store application. The cybercriminal shared the information
BASIC COMPONENTS. There are 3 basic components in every Apache Cordova project:
Apache Cordova is a open-source mobile development framework. It allows you to use standard web technologies such as HTML5, CSS3 and JavaScript for cross-platform development, avoiding each mobile platform
Islamic University of Gaza. Faculty of Engineering. Computer Engineering Department. Mobile Computing ECOM 5341. Eng. Wafaa Audah.
Islamic University of Gaza Faculty of Engineering Computer Engineering Department Mobile Computing ECOM 5341 By Eng. Wafaa Audah June 2013 1 Setting Up the Development Environment and Emulator Part 1:
SSOScan: Automated Testing of Web Applications for Single Sign-On vulnerabilities
123456 SSOScan: Automated Testing of Web Applications for Single Sign-On vulnerabilities Yuchen Zhou David Evans 1 http://www.ssoscan.org/ Single Sign-On Service 2 Single Sign-On Workflow Integrator (e.g.,
Affiliate Marketing for Mobile Apps. Peter Hamilton Partner / CMO Email: [email protected] Twitter: @PeterHamilton #AMDays
Affiliate Marketing for Mobile Apps Peter Hamilton Partner / CMO Email: [email protected] Twitter: @PeterHamilton #AMDays BOOM!!! Mobile Devices: More Mobile Phones than Humans on Earth More Smart Phones
Mobile App Install Ads
Mobile App Install Ads Product Setup Guide What is launching? Mobile app install ads help developers and advertisers easily drive and measure installs (CPI) for their mobile apps and games. This is the
Download and Installation Instructions. Android SDK and Android Development Tools (ADT)
Download and Installation Instructions for Android SDK and Android Development Tools (ADT) on Mac OS X Updated October, 2012 This document will describe how to download and install the Android SDK and
WebView addjavascriptinterface Remote Code Execution 23/09/2013
MWR InfoSecurity Advisory WebView addjavascriptinterface Remote Code Execution 23/09/2013 Package Name Date Affected Versions Google Android Webkit WebView 23/09/2013 All Android applications built with
Mobile Security. Luther Knight - @lutherldn Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.
Mobile Security Luther Knight - @lutherldn Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015 12015 IBM Corporation Where I Started: Blackberry Migration BYOD Bring Your Own
Defending Behind The Device Mobile Application Risks
Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem
Is it Time to Trust the Cloud? Unpacking the Notorious Nine
Is it Time to Trust the Cloud? Unpacking the Notorious Nine Jonathan C. Trull, CISO, Qualys Cloud Security Alliance Agenda Cloud Security Model Background on the Notorious Nine Unpacking the Notorious
Web. Paul Pajares and Max Goncharov. Connection. Edition. ios platform are also at risk, as. numbers via browser-based social.
RESEARCHBRIEF Fake Apps, Russia, and the Mobile Making the SMSS Fraud Connection Paul Pajares and Max Goncharov Web News of an SMS fraud service affecting many countries first broke out in Russia in 2010.
Overview. About Interstitial Ads: About Banner Ads: About Offer-Wall Ads: ADAttract Account & ID
Overview About Interstitial Ads: Interstitial ads are full screen ads that cover the interface of their host app. They are generally displayed at usual transformation points in the flow of an app, such
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
Enterprise Mobile Threat Report
Enterprise Mobile Threat Report The State of ios and Android Security Threats to Enterprise Mobility I. Introduction This report examines enterprise security threats for ios and Android. While Android
Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo
Symantec's Secret Sauce for Mobile Threat Protection Jon Dreyfus, Ellen Linardi, Matthew Yeo 1 Agenda 1 2 3 4 Threat landscape and Mobile Insight overview What s unique about Mobile Insight Mobile Insight
Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy.
MOBILE APPLICATION PRIVACY POLICY Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy. SCOPE OF POLICY This policy (together with our end-user licence agreement
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
How To Track Your Mobile Marketing On A Mobile Device
emma Mobile Business Intelligence The big problem in ecommerce is the recurrency Best customers comes from Mobile emma is Mobile Business Intelligence. The ultimate mobile marketing technology in the market
Importing and using your Personal Authentication Certificate with Djigzo for Android
Personal Authentication Certificates Importing and using your Personal Authentication Certificate with Djigzo for Android Djigzo is a third party mobile application that provides S/MIME services which
U.S. Cellular Mobile Data Security. User Guide Version 00.01
U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4
GCM for Android Setup Guide
GCM for Android Setup Guide This guide provides information on...... Prerequisites for using Google Cloud Messaging service... Instructions for setting up GCM service via the Google API console... Configuring
Creating Enterprise Mobile Apps with Red Hat
Creating Enterprise Mobile Apps with Red Hat Red Hat, Jun12 2013 Deepali, Jay & Burr Gold Rush Enterprise Mobile Rush? ios.. ios...... ios Gold Rush Vs Mobile Rush Similar California epicenter Shaped history
How we keep harmful apps out of Google Play and keep your Android device safe
How we keep harmful apps out of Google Play and keep your Android device safe February 2016 Bad apps create bad experiences, so we work hard to keep them off your device and out of Google Play. In 2015,
3. GENERALI MOBILE APPLICATION CONTENT. 3 P a g e
User Manual Generali Mobile application iphone и Android 1. MOBILE APPLICATION INSTALLMENT Generali Mobile application can be used after installation from the application markets Play Store (Android) and
Tizen Validation Guidelines
Tizen Validation Guidelines Tizen Validation Guide Index 1. Introduction... 3 2. Application Validation Process... 4 2.1 Initial Inspection & Dynamic Analysis... 4 2.2 Content Review & Final Confirmation...
Two-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u
Demo Access AUTHOR: System4u BlackBerry Universal Device Service Revisions Date Version Description Author June 26 th 2012 1.0 Roman Přikryl September 25 th 2012 1.5 Revision Roman Přikryl October 5 th
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner [email protected] IAIK
Motivation 2 Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] What you have heard last time Mobile devices: Short history, features Technical evolution, major OS,
PULSE APPCONNECT. A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway.
PULSE APPCONNECT A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway Published Date July 2015 Contents Executive Summary 3 Introduction
Comodo Mobile Security for Android Software Version 2.5
Comodo Mobile Security for Android Software Version 2.5 User Guide Guide Version 2.5.111014 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Mobile
BYPASSING THE ios GATEKEEPER
BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY
SMARTDEVICELINK CONNECTIVITY FROM THE CAR S POINT OF VIEW
SMARTDEVICELINK CONNECTIVITY FROM THE CAR S POINT OF VIEW 2 Continuing to open highways 3 4 5 Developing for the car ~68 million vehicles sold globally in 2013 6 Developing for the car ~68 million ~978
Introduction to Gear VR Development in Unity APPENDIX A: SETUP (MAC OS X)
Introduction to Gear VR Development in Unity APPENDIX A: SETUP (MAC OS X) 3-hour Workshop Version 2015.07.13 Contact us at [email protected] Presented by Samsung Developer Connection and MSCA Engineering
Take Your Mac OS X Security to NSA Standards June 19, 2014 by Larry Chafin
Take Your Mac OS X Security to NSA Standards June 19, 2014 by Larry Chafin Forword While doing research for another article, I came across NSA s security setup for Mac OS X. No, the information gained
Kore Bots Platform Competitive Comparison Overview Kore Bots Platform Competitive Comparison Overview
Kore Bots Competitive Comparison Overview Kore Bots Competitive Comparison Overview 1 Kore Bots Competitive Comparison Overview Kore The intelligent Bots for the Enterprise Introduction Bots have officially
Utilizing Dropbox to Share Files
Utilizing Dropbox to Share Files At times it is necessary to share large files with instructors or other students. Dropbox.com provides a very user friendly solution to fill this need. Dropbox is designed
How To Create A Bada App On Android 2.2.2 (Mainfest) On Android 3.5.2 And Get A Download Of Bada (For Android) On A Microsoft Gosu 2.5 (For Black
I. bada... 3 1. Developer Site : Register application development information... 3 1) Registration procedure... 3 2) Standards for managing mainfest.xml depending on status of registration for bada application
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
The "Eclipse Classic" version is recommended. Otherwise, a Java or RCP version of Eclipse is recommended.
Installing the SDK This page describes how to install the Android SDK and set up your development environment for the first time. If you encounter any problems during installation, see the Troubleshooting
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Enrollment Process for Android Devices
1 Enrollment Process for Android Devices Introduction:... 2 Pre-requisites:... 2 Via SMS:... 2 Via Email:... 11 Self Service:... 19 2 Introduction: This is a brief guide to enrolling an android device
PRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS
www.openi-ict.eu Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets PRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS Open-Source,
Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved
Building a Mobile App Security Risk Management Program Your Presenters Who Are We? Chris Salerno, Consultant, Security Risk Advisors Lead consultant for mobile, network, web application penetration testing
Ibrahim Yusuf Presales Engineer at Sophos [email protected]. Smartphones and BYOD: what are the risks and how do you manage them?
Ibrahim Yusuf Presales Engineer at Sophos [email protected] Smartphones and BYOD: what are the risks and how do you manage them? Tablets on the rise 2 Diverse 3 The Changing Mobile World Powerful devices
Download and Installation Instructions. Android SDK and Android Development Tools (ADT) Microsoft Windows
Download and Installation Instructions for Android SDK and Android Development Tools (ADT) on Microsoft Windows Updated September, 2013 This document will describe how to download and install the Android
Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer
Advanced Online Threat Protection: Defending Your Online Banking Customers Against Modern Malware and Fraud Andrew Bagnato Senior Systems Engineer Agenda Modern malware a targets Account credentials Financial
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
How to downgrade Samsung Galaxy Tab 2 back to original V4.1.1 Android OS
How to downgrade Samsung Galaxy Tab 2 back to original V4.1.1 Android OS Important information: This procedure restores the Samsung Galaxy tablet, used with the 1750 Fluke Power Recorder product back to
Use of tablet devices in NHS environments: Good Practice Guideline
Use of Tablet Devices in NHS environments: Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Technology Office Prog. Director Chris Wilber Status APPROVED Owner James Wood
Enterprise Mobility Report 06/2015. Creation date: 1.7.2015. Vlastimil Turzík
06/2015 Creation date: 1.7.2015 Author: Vlastimil Turzík Content Content... 2 Introduction... 4 ios... 4 Vulnerability... 4 ios Mail App Vulnerability Allows Hackers To Steal icloud Passwords... 4 Versions:
APPLE WITHOUT A SHELL IOS UNDER TARGETED ATTACK Tao Wei, Min Zheng, Hui Xue & Dawn Song FireEye, Inc., USA
APPLE WITHOUT A SHELL IOS UNDER TARGETED ATTACK Tao Wei, Min Zheng, Hui Xue & Dawn Song FireEye, Inc., USA Email {tao.wei, min.zheng, hui.xue, dawn.song}@ fireeye.com ABSTRACT Apple has a strict review
The biggest mistake we made as a company was betting too much on HTML5 as opposed to native.
Myths About Web-Enabled Mobile event solutions With so many vendors in the marketplace, it s hard to know where to start looking for the right mobile solution for your next event and even harder to tell
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management
Mobile and Social Computing
ì Mobile and Social Computing A.A. 2015/16 Lesson 1 Introduction to mobile and social computing About me Ing. Francesco Florio Mobile designer and developer since 2009 GDG Cosenza manager Teacher for University
(In-)Security of Backend-as-a-Service
(In-)Security of Backend-as-a-Service Siegfried Rasthofer (TU Darmstadt / CASED) Steven Arzt (TU Darmstadt / CASED) Robert Hahn (TU Darmstadt) Max Kolhagen (TU Darmstadt) Eric Bodden (Fraunhofer SIT /
Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program
Mobile Application Security Helping Organizations Develop a Secure and Effective Mobile Application Security Program by James Fox [email protected] Shahzad Zafar [email protected] Mobile applications
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
Securing Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
Protecting against Mobile Attacks
2014-APR-17 Protecting against Mobile Attacks Frankie Wong Security Analyst, HKCERT 1 Image source: http://www.techweekeurope.co.uk/news/mobile-malware-record-mcafee-125537 2 Agenda Attacks moving to mobile
Fingerprints On Mobile Devices: Abusing and Leaking
Fingerprints On Mobile Devices: Abusing and Leaking I. Introduction YulongZhang,ZhaofengChen,HuiXue,andTaoWei FireEyeLabs Fingerprintscannersarebecomingmoreandmorepopularonthemodernmobiledeviceslike HTCOneMax,HuaweiMate7,iPhone5s/6/6+,andSamsungGalaxyS5.Basedonarecent
ios Developer Program Information
apple ios Developer Program Information Introduction The ios Developer Program provides a complete and integrated process for developing and distributing ipad, iphone and ipod touch applications. With
Izplatītākie mobilo iekārtu lietošanas riski, kas apdraud organizācijas datu un informācijas sistēmu drošību Raivis Kalniņš 2015, Riga
Riga, Latvia Izplatītākie mobilo iekārtu lietošanas riski, kas apdraud organizācijas datu un informācijas sistēmu drošību Raivis Kalniņš 2015, Riga What We Do? Data Security Solutions business card Endpoints
Appery.io Overview. However mobile also presents many challenges for enterprises:
Appery.io Overview Enterprises and businesses of all sizes are racing to mobilize existing business applications and create new ones at an unprecedented pace. And with the base of smartphones and tablets
Feature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
Use Host Information in Policy Enforcement
Use Host Information in Policy Enforcement Although you may have stringent security at your corporate network border, your network is really only as secure as the end devices that are accessing it. With
INTRODUCTION TO THE PROJECT TRACKING WEB APPLICATION
INTRODUCTION This document shows a Local Department Administrator for how to set up projects and assigned employees within the web application. The web application works in conjunction with HCM and CalTime
Backend as a Service
Backend as a Service Apinauten GmbH Hainstraße 4 04109 Leipzig 1 Backend as a Service Applications are equipped with a frontend and a backend. Programming and administrating these is challenging. As the
SAP Mobile Platform Intro
SAP Mobile Platform Intro Agenda SAP Mobile Platform overview App types Core platform services Backend connectivity Open technologies HANA Cloud Platform Key UI Tools and Technologies SAP Fiori Launchpad
Hands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen [email protected]
A Review of Different Comparative Studies on Mobile Operating System
Research Journal of Applied Sciences, Engineering and Technology 7(12): 2578-2582, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: August 30, 2013 Accepted: September
Migrating Trend Micro Mobile Security for Enterprise (TMMS) 8.0 to TMMS 9.0 Patch 1
Migrating Trend Micro Mobile Security for Enterprise (TMMS) 8.0 to TMMS 9.0 Patch 1 Migrating TMMS 8.0 to version 9.0 Patch 1 involves the following steps: 1. Pre-migration 2. Backing up the database and
