SlideShare a Scribd company logo
1 of 4
CSIA 360: Cybersecurity in Government Organizations
Copyright ©2019 by University of Maryland University College. All Rights Reserved
Open this link for Solution
https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security-
Assessment--Strategy---2019
Project 3:Government Mobile Apps Security Assessment & Strategy
For thisresearchreportyouwill researchandthenpresentyourfindingsaboutcybersecurity
issuesspecifictomobile applications.Youwill alsoprovide asetof recommendationsforbestpractices
(your“strategy”) forsecurityarchitecturesanddesignsformobile apps.
Mobile applicationsare importantbecause theyallowcitizensandotherstakeholderstoaccess
informationandservicesthroughthe federal government’sdigitalgovernmentinitiatives.Formore
informationaboutrequirementstoprovide mobilefriendlywebsitesandmobile appssee thisblog
postingfromCIO.GOV https://www.cio.gov/2018/08/13/design-accessibility.htmlandthe textof the
ConnectedGovernmentActPublicLaw115-114 https://www.congress.gov/115/plaws/publ114/PLAW-
115publ114.pdf
Note:thisassignmentrequiresinclusionof diagramsorgraphicswhichhelptoexplainthe
informationprovidedinyouranalysisandstrategy.Youare notrequiredtocreate these onyour own.
Instead,youshouldlookforuseful graphics/diagramsinthe readingsanduse those tosupportyour
work.You mustcite the source foreach piece of artworkusedinyour project.Puta figure captionunder
the diagramor chart and then place the in-textcitationatthe endof the caption.See the example atthe
endof thisfile.
Research:
1. Reviewthe Weeklyreadings.
2. ReviewrecentchangesinUSLaws regardingthe requirementformobilefriendlygovernment
websites.
a. https://www.congress.gov/115/plaws/publ114/PLAW-115publ114.pdf
b. https://www.nextgov.com/ideas/2018/01/what-digital-government-cx-pros-should-
know-about-connected-government-act/144987/
c. https://www.fedscoop.com/bill-mobile-friendly-government-websites-cruises-senate/
3. Researchthe “best”of federal mobile appstosee examplesof the type of appsthatother agencies
have createdinthe past.
a. 19 of theCoolestGovernmentMobile
Appshttps://www.govloop.com/community/blog/cool-gov-mobile-apps/
b. 10 MostEntertaining GovernmentMobileApps
https://www.govloop.com/community/blog/10-most-entertaining-government-mobile-
apps/
c. 3 Innovative WaysAgenciesare LeveragingMobile Apps http://fedscoop.com/great-
government-mobile-apps
CSIA 360: Cybersecurity in Government Organizations
Copyright ©2019 by University of Maryland University College. All Rights Reserved
4. Researchthe federal government’sperspective onmobileappsecurityarchitecturesanddesign
recommendations.Here are three sourcestohelpyougetstarted:
a. App Developers:Startwith Security
https://www.ftc.gov/tips-advice/business-center/guidance/app-developers-start-
security
b. Mobile SecurityReference Architecture
https://s3.amazonaws.com/sitesusa/wp-
content/uploads/sites/1151/downloads/2013/05/Mobile-Security-Reference-
Architecture.pdf
c. Howto build a secure mobileapp:10 tips
https://www.techrepublic.com/article/how-to-build-a-secure-mobile-app-10-tips/
5. Researchindustryrecommendationsformobileappsecurity.Beginwiththe followingsources:
a. OWASPMobileSecurity
Projecthttps://www.owasp.org/index.php/OWASP_Mobile_Security_Project
b. Top 10 MobileRisks(clickontab)
https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mo
bile_Risks
c. Mobile app security:Alwayskeep the backdoor
lockedhttp://arstechnica.com/security/2013/02/mobile-app-security-always-keep-the-
back-door-locked/
6. Findfive ormore bestpractice recommendationsforensuringthe securityof mobile apps.These
recommendationsmustincludesecurityforthe platform(mobile device),the dataonthe device,
and the transmissionpathbetweenthe device andthe mobile applicationserver.Yourfocusshould
be upon recommendationswhichcanbe implementedaspartof a strategyforreducingrisk.
Write:
Write a five tosevenpage reportinwhichyousummarize yourresearchandpresentyour“best
practices”basedstrategyforreducingriskand ensuringsecurityforgovernmentprovidedmobile apps
and theirusers.Youshouldfocusuponclarityandconcisenessmore than lengthwhendetermining
whatcontentto include inyourpaper.Ata minimum, yourreportmustinclude the following:
1. An introductionoroverview of mobileappsfordigital government.Youroverview shouldinclude
discussionof the Connected GovernmentAct,examplesof mobile appswhichare recognizedas
beinginnovative,and“bestof category”applicationsfordeliveringgovernmentinformationand
servicestomobile devices.Thisintroductionshouldbe suitableforanexecutiveaudience.
2. A separate sectioninwhichyoudiscussthe federal government’srequirementsand
recommendationsformobile appsecurityarchitecturesandthe associateddesign
recommendations.Thissectionshouldbe writtenfornon-technical managers;youwill needto
translate fromtech-speaktomanager-speak.Diagramsandpicturesmaybe useful but,remember
to include the appropriate in-textcitationsforthe source (appendtothe figure caption).
CSIA 360: Cybersecurity in Government Organizations
Copyright ©2019 by University of Maryland University College. All Rights Reserved
3. A separate sectioninwhichyoudiscussindustry’srecommendationsforsecurityarchitecturesand
riskreductionformobile appsecurity.
4. A sectioninwhichyoupresent5 or morebestpracticerecommendationsforbuildingsecurityinto
mobile applicationsusedtodelivergovernmentinformationandservices.These recommendations
shouldbe presentedasastrategyfor reducingrisk.
5. A separate sectioninwhichyousummarize yourresearchandrecommendations.
SubmitFor Grading
Submityourworkin MS Word format (.docx or.doc file) usingthe Project3Assignmentinyour
assignmentfolder.(Attachthe file.)
Additional Information
1. Consultthe gradingrubricfor specificcontentandformattingrequirementsforthisassignment.
2. Your 5 to 7 page researchreportshouldbe professionalinappearance withconsistentuse of
fonts,fontsizes,margins,etc.Youshoulduse headingsandpage breakstoorganize yourpaper.
3. Your papershoulduse standardtermsand definitionsforcybersecurity.
4. The CSIA programrecommendsthatyoufollow standardAPA formattingsince thiswill give you
a documentthat meetsthe “professional appearance”requirements.APA formattingguidelines
and examplesare foundunderCourse Resources>APA Resources.AnAPA template file (MS
Word format) hasalso beenprovidedforyouruse
CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx.
5. You mustinclude acover page withthe assignmenttitle,yourname,andthe due date.Your
reference listmustbe ona separate page at the endof your file.These pagesdonotcount
towardsthe assignment’spage count.
6. You are expectedtowrite grammaticallycorrectEnglishineveryassignmentthatyousubmitfor
grading.Do not turnin anywork without(a) usingspell check,(b) usinggrammarcheck,(c)
verifyingthatyourpunctuationiscorrectand(d) reviewingyourworkforcorrectword usage
and correctlystructuredsentencesandparagraphs.
7. Credityoursourcesusingin-textcitationsandreference listentries.Bothyourcitationsandyour
reference listentriesmustfollow aconsistentcitationstyle(APA,MLA,etc.).
Example Diagram with Citation and Reference ListEntry
CSIA 360: Cybersecurity in Government Organizations
Copyright ©2019 by University of Maryland University College. All Rights Reserved
Figure 1. Enterprise Core Services (Adapted from Figure 1 in CIO Council, 2013, p. 5)
Federal CIOCouncil &Departmentof HomelandSecurity.(2013). Mobilesecurity referencearchitecture.
Retrievedfrom https://s3.amazonaws.com/sitesusa/wp-content/uploads/sites/1151/
downloads/2013/05/Mobile-Security-Reference-Architecture.pdf
Open this link for Solution
https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security-
Assessment--Strategy---2019
Open this link for Solution
https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security-
Assessment--Strategy---2019
Open this link for Solution
https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security-
Assessment--Strategy---2019

More Related Content

What's hot

Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend BriefBill Chamberlin
 
Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...
Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...
Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...IMARC Group
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessSymantec
 
Top 10 Mobile Application Development Trends In 2016
Top 10 Mobile Application Development Trends In 2016Top 10 Mobile Application Development Trends In 2016
Top 10 Mobile Application Development Trends In 2016V2Soft
 
Enterprise endpoint security_market
Enterprise endpoint security_marketEnterprise endpoint security_market
Enterprise endpoint security_marketpallavi_1234
 
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataApp Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataJohn Davis
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012Icomm Technologies
 
Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...
Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...
Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...IMARC Group
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec
 
Unisys Security Insights Infographic: Global
Unisys Security Insights Infographic: GlobalUnisys Security Insights Infographic: Global
Unisys Security Insights Infographic: GlobalUnisys Corporation
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape mercatoradvisory
 
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivSentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivNOAH Advisors
 
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...Samsung Biz Mobile
 
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...Black Duck by Synopsys
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacySymantec
 
Mobile app industry
Mobile app industryMobile app industry
Mobile app industrysagarpd91
 
Digital Generation: Security Infographic
Digital Generation: Security InfographicDigital Generation: Security Infographic
Digital Generation: Security InfographicUnisys Corporation
 
Gartner Market Insights- Mobile Threat Defense and EMM
Gartner Market Insights- Mobile Threat Defense and EMMGartner Market Insights- Mobile Threat Defense and EMM
Gartner Market Insights- Mobile Threat Defense and EMMYoussef Afzali
 
The Internet of Things: Opportunity for Insurers
The Internet of Things: Opportunity for InsurersThe Internet of Things: Opportunity for Insurers
The Internet of Things: Opportunity for InsurersAndrea Silvello
 

What's hot (20)

Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
 
Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...
Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...
Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
Top 10 Mobile Application Development Trends In 2016
Top 10 Mobile Application Development Trends In 2016Top 10 Mobile Application Development Trends In 2016
Top 10 Mobile Application Development Trends In 2016
 
Enterprise endpoint security_market
Enterprise endpoint security_marketEnterprise endpoint security_market
Enterprise endpoint security_market
 
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataApp Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing Data
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...
Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...
Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
 
Unisys Security Insights Infographic: Global
Unisys Security Insights Infographic: GlobalUnisys Security Insights Infographic: Global
Unisys Security Insights Infographic: Global
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape
 
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivSentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel Aviv
 
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...
 
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
 
Cloud computing market
Cloud computing marketCloud computing market
Cloud computing market
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
 
Mobile app industry
Mobile app industryMobile app industry
Mobile app industry
 
Digital Generation: Security Infographic
Digital Generation: Security InfographicDigital Generation: Security Infographic
Digital Generation: Security Infographic
 
Gartner Market Insights- Mobile Threat Defense and EMM
Gartner Market Insights- Mobile Threat Defense and EMMGartner Market Insights- Mobile Threat Defense and EMM
Gartner Market Insights- Mobile Threat Defense and EMM
 
The Internet of Things: Opportunity for Insurers
The Internet of Things: Opportunity for InsurersThe Internet of Things: Opportunity for Insurers
The Internet of Things: Opportunity for Insurers
 

Similar to Project 3:Government Mobile Apps Security Assessment & Strategy

Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...bupbechanhgmail
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsIBM Software India
 
F5 State of App Strategy Report 2023.pdf
F5 State of App Strategy Report 2023.pdfF5 State of App Strategy Report 2023.pdf
F5 State of App Strategy Report 2023.pdfZeppos Galanos, MSc.
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdriveaccenture
 
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...Utah Tech Labs
 
Samsung_FCW GameChanger
Samsung_FCW GameChangerSamsung_FCW GameChanger
Samsung_FCW GameChangerJohnny Overcast
 
Mobile App Development
Mobile App DevelopmentMobile App Development
Mobile App Developmentmightymarketing
 
Role of Mobility in Workplace Transformation
Role of Mobility in Workplace TransformationRole of Mobility in Workplace Transformation
Role of Mobility in Workplace TransformationAVI-SPL
 
Mobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security ControlMobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security ControlTech Mahindra
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSAP Solution Extensions
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodesciccone
 
Selling Your Organization on Application Security
Selling Your Organization on Application SecuritySelling Your Organization on Application Security
Selling Your Organization on Application SecurityVeracode
 
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...IMARC Group
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
Strategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyStrategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyMobile Labs
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersCisco Mobility
 
IoT services in the automotive sector
IoT services in the automotive sectorIoT services in the automotive sector
IoT services in the automotive sectorPRIME
 
State Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile ReadinessState Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile ReadinessKloudData Inc
 
Accelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise MobilityAccelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise MobilityMelissa Luongo
 

Similar to Project 3:Government Mobile Apps Security Assessment & Strategy (20)

Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology Innovations
 
F5 State of App Strategy Report 2023.pdf
F5 State of App Strategy Report 2023.pdfF5 State of App Strategy Report 2023.pdf
F5 State of App Strategy Report 2023.pdf
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
 
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
 
Samsung_FCW GameChanger
Samsung_FCW GameChangerSamsung_FCW GameChanger
Samsung_FCW GameChanger
 
The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019
 
Mobile App Development
Mobile App DevelopmentMobile App Development
Mobile App Development
 
Role of Mobility in Workplace Transformation
Role of Mobility in Workplace TransformationRole of Mobility in Workplace Transformation
Role of Mobility in Workplace Transformation
 
Mobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security ControlMobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security Control
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
 
Selling Your Organization on Application Security
Selling Your Organization on Application SecuritySelling Your Organization on Application Security
Selling Your Organization on Application Security
 
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Strategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyStrategic Private Cloud - When and Why
Strategic Private Cloud - When and Why
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
IoT services in the automotive sector
IoT services in the automotive sectorIoT services in the automotive sector
IoT services in the automotive sector
 
State Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile ReadinessState Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile Readiness
 
Accelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise MobilityAccelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise Mobility
 

More from Arshad ali

Tax655 final project_guidelines_and_rubric-converted (1)
Tax655 final project_guidelines_and_rubric-converted (1)Tax655 final project_guidelines_and_rubric-converted (1)
Tax655 final project_guidelines_and_rubric-converted (1)Arshad ali
 
Liberty university psyc 210 quiz 1- 9
Liberty university psyc 210 quiz 1- 9Liberty university psyc 210 quiz 1- 9
Liberty university psyc 210 quiz 1- 9Arshad ali
 
Bus520 assignment 1-converted
Bus520 assignment 1-convertedBus520 assignment 1-converted
Bus520 assignment 1-convertedArshad ali
 
Open this link for solution
Open this link for solutionOpen this link for solution
Open this link for solutionArshad ali
 
Solution
SolutionSolution
SolutionArshad ali
 
Criminal profiling
Criminal profilingCriminal profiling
Criminal profilingArshad ali
 

More from Arshad ali (6)

Tax655 final project_guidelines_and_rubric-converted (1)
Tax655 final project_guidelines_and_rubric-converted (1)Tax655 final project_guidelines_and_rubric-converted (1)
Tax655 final project_guidelines_and_rubric-converted (1)
 
Liberty university psyc 210 quiz 1- 9
Liberty university psyc 210 quiz 1- 9Liberty university psyc 210 quiz 1- 9
Liberty university psyc 210 quiz 1- 9
 
Bus520 assignment 1-converted
Bus520 assignment 1-convertedBus520 assignment 1-converted
Bus520 assignment 1-converted
 
Open this link for solution
Open this link for solutionOpen this link for solution
Open this link for solution
 
Solution
SolutionSolution
Solution
 
Criminal profiling
Criminal profilingCriminal profiling
Criminal profiling
 

Recently uploaded

RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Call Girls Hebbal Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangaloreamitlee9823
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Call Girls Electronic City Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Servi...
Call Girls Electronic City Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Servi...Call Girls Electronic City Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Servi...
Call Girls Electronic City Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Servi...amitlee9823
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...amitlee9823
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 

Recently uploaded (20)

RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls Hebbal Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Call Girls Electronic City Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Servi...
Call Girls Electronic City Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Servi...Call Girls Electronic City Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Servi...
Call Girls Electronic City Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Servi...
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 

Project 3:Government Mobile Apps Security Assessment & Strategy

  • 1. CSIA 360: Cybersecurity in Government Organizations Copyright ©2019 by University of Maryland University College. All Rights Reserved Open this link for Solution https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security- Assessment--Strategy---2019 Project 3:Government Mobile Apps Security Assessment & Strategy For thisresearchreportyouwill researchandthenpresentyourfindingsaboutcybersecurity issuesspecifictomobile applications.Youwill alsoprovide asetof recommendationsforbestpractices (your“strategy”) forsecurityarchitecturesanddesignsformobile apps. Mobile applicationsare importantbecause theyallowcitizensandotherstakeholderstoaccess informationandservicesthroughthe federal government’sdigitalgovernmentinitiatives.Formore informationaboutrequirementstoprovide mobilefriendlywebsitesandmobile appssee thisblog postingfromCIO.GOV https://www.cio.gov/2018/08/13/design-accessibility.htmlandthe textof the ConnectedGovernmentActPublicLaw115-114 https://www.congress.gov/115/plaws/publ114/PLAW- 115publ114.pdf Note:thisassignmentrequiresinclusionof diagramsorgraphicswhichhelptoexplainthe informationprovidedinyouranalysisandstrategy.Youare notrequiredtocreate these onyour own. Instead,youshouldlookforuseful graphics/diagramsinthe readingsanduse those tosupportyour work.You mustcite the source foreach piece of artworkusedinyour project.Puta figure captionunder the diagramor chart and then place the in-textcitationatthe endof the caption.See the example atthe endof thisfile. Research: 1. Reviewthe Weeklyreadings. 2. ReviewrecentchangesinUSLaws regardingthe requirementformobilefriendlygovernment websites. a. https://www.congress.gov/115/plaws/publ114/PLAW-115publ114.pdf b. https://www.nextgov.com/ideas/2018/01/what-digital-government-cx-pros-should- know-about-connected-government-act/144987/ c. https://www.fedscoop.com/bill-mobile-friendly-government-websites-cruises-senate/ 3. Researchthe “best”of federal mobile appstosee examplesof the type of appsthatother agencies have createdinthe past. a. 19 of theCoolestGovernmentMobile Appshttps://www.govloop.com/community/blog/cool-gov-mobile-apps/ b. 10 MostEntertaining GovernmentMobileApps https://www.govloop.com/community/blog/10-most-entertaining-government-mobile- apps/ c. 3 Innovative WaysAgenciesare LeveragingMobile Apps http://fedscoop.com/great- government-mobile-apps
  • 2. CSIA 360: Cybersecurity in Government Organizations Copyright ©2019 by University of Maryland University College. All Rights Reserved 4. Researchthe federal government’sperspective onmobileappsecurityarchitecturesanddesign recommendations.Here are three sourcestohelpyougetstarted: a. App Developers:Startwith Security https://www.ftc.gov/tips-advice/business-center/guidance/app-developers-start- security b. Mobile SecurityReference Architecture https://s3.amazonaws.com/sitesusa/wp- content/uploads/sites/1151/downloads/2013/05/Mobile-Security-Reference- Architecture.pdf c. Howto build a secure mobileapp:10 tips https://www.techrepublic.com/article/how-to-build-a-secure-mobile-app-10-tips/ 5. Researchindustryrecommendationsformobileappsecurity.Beginwiththe followingsources: a. OWASPMobileSecurity Projecthttps://www.owasp.org/index.php/OWASP_Mobile_Security_Project b. Top 10 MobileRisks(clickontab) https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mo bile_Risks c. Mobile app security:Alwayskeep the backdoor lockedhttp://arstechnica.com/security/2013/02/mobile-app-security-always-keep-the- back-door-locked/ 6. Findfive ormore bestpractice recommendationsforensuringthe securityof mobile apps.These recommendationsmustincludesecurityforthe platform(mobile device),the dataonthe device, and the transmissionpathbetweenthe device andthe mobile applicationserver.Yourfocusshould be upon recommendationswhichcanbe implementedaspartof a strategyforreducingrisk. Write: Write a five tosevenpage reportinwhichyousummarize yourresearchandpresentyour“best practices”basedstrategyforreducingriskand ensuringsecurityforgovernmentprovidedmobile apps and theirusers.Youshouldfocusuponclarityandconcisenessmore than lengthwhendetermining whatcontentto include inyourpaper.Ata minimum, yourreportmustinclude the following: 1. An introductionoroverview of mobileappsfordigital government.Youroverview shouldinclude discussionof the Connected GovernmentAct,examplesof mobile appswhichare recognizedas beinginnovative,and“bestof category”applicationsfordeliveringgovernmentinformationand servicestomobile devices.Thisintroductionshouldbe suitableforanexecutiveaudience. 2. A separate sectioninwhichyoudiscussthe federal government’srequirementsand recommendationsformobile appsecurityarchitecturesandthe associateddesign recommendations.Thissectionshouldbe writtenfornon-technical managers;youwill needto translate fromtech-speaktomanager-speak.Diagramsandpicturesmaybe useful but,remember to include the appropriate in-textcitationsforthe source (appendtothe figure caption).
  • 3. CSIA 360: Cybersecurity in Government Organizations Copyright ©2019 by University of Maryland University College. All Rights Reserved 3. A separate sectioninwhichyoudiscussindustry’srecommendationsforsecurityarchitecturesand riskreductionformobile appsecurity. 4. A sectioninwhichyoupresent5 or morebestpracticerecommendationsforbuildingsecurityinto mobile applicationsusedtodelivergovernmentinformationandservices.These recommendations shouldbe presentedasastrategyfor reducingrisk. 5. A separate sectioninwhichyousummarize yourresearchandrecommendations. SubmitFor Grading Submityourworkin MS Word format (.docx or.doc file) usingthe Project3Assignmentinyour assignmentfolder.(Attachthe file.) Additional Information 1. Consultthe gradingrubricfor specificcontentandformattingrequirementsforthisassignment. 2. Your 5 to 7 page researchreportshouldbe professionalinappearance withconsistentuse of fonts,fontsizes,margins,etc.Youshoulduse headingsandpage breakstoorganize yourpaper. 3. Your papershoulduse standardtermsand definitionsforcybersecurity. 4. The CSIA programrecommendsthatyoufollow standardAPA formattingsince thiswill give you a documentthat meetsthe “professional appearance”requirements.APA formattingguidelines and examplesare foundunderCourse Resources>APA Resources.AnAPA template file (MS Word format) hasalso beenprovidedforyouruse CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx. 5. You mustinclude acover page withthe assignmenttitle,yourname,andthe due date.Your reference listmustbe ona separate page at the endof your file.These pagesdonotcount towardsthe assignment’spage count. 6. You are expectedtowrite grammaticallycorrectEnglishineveryassignmentthatyousubmitfor grading.Do not turnin anywork without(a) usingspell check,(b) usinggrammarcheck,(c) verifyingthatyourpunctuationiscorrectand(d) reviewingyourworkforcorrectword usage and correctlystructuredsentencesandparagraphs. 7. Credityoursourcesusingin-textcitationsandreference listentries.Bothyourcitationsandyour reference listentriesmustfollow aconsistentcitationstyle(APA,MLA,etc.). Example Diagram with Citation and Reference ListEntry
  • 4. CSIA 360: Cybersecurity in Government Organizations Copyright ©2019 by University of Maryland University College. All Rights Reserved Figure 1. Enterprise Core Services (Adapted from Figure 1 in CIO Council, 2013, p. 5) Federal CIOCouncil &Departmentof HomelandSecurity.(2013). Mobilesecurity referencearchitecture. Retrievedfrom https://s3.amazonaws.com/sitesusa/wp-content/uploads/sites/1151/ downloads/2013/05/Mobile-Security-Reference-Architecture.pdf Open this link for Solution https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security- Assessment--Strategy---2019 Open this link for Solution https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security- Assessment--Strategy---2019 Open this link for Solution https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security- Assessment--Strategy---2019