Submit Search
Upload
Project 3:Government Mobile Apps Security Assessment & Strategy
•
Download as DOCX, PDF
•
1 like
•
100 views
A
Arshad ali
Follow
Project 3:Government Mobile Apps Security Assessment & Strategy
Read less
Read more
Business
Report
Share
Report
Share
1 of 4
Download now
Recommended
Mobility Trends in 2012 and Beyond
Mobility Trends in 2012 and Beyond
CompTIA
Â
Global Cloud Services Market
Global Cloud Services Market
nishashaha
Â
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.
Veracode
Â
mHealth Journal overview - mhealth apps - mobile health apps
mHealth Journal overview - mhealth apps - mobile health apps
mHealth Journal
Â
Tech mahindra whitepaper modified mobile app store architecture with pro acti...
Tech mahindra whitepaper modified mobile app store architecture with pro acti...
anuragsinghal1981
Â
The Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t Ignore
Veracode
Â
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Aarkstore Enterprise
Â
Retail Industry Application Security Survey Insights
Retail Industry Application Security Survey Insights
Veracode
Â
Recommended
Mobility Trends in 2012 and Beyond
Mobility Trends in 2012 and Beyond
CompTIA
Â
Global Cloud Services Market
Global Cloud Services Market
nishashaha
Â
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.
Veracode
Â
mHealth Journal overview - mhealth apps - mobile health apps
mHealth Journal overview - mhealth apps - mobile health apps
mHealth Journal
Â
Tech mahindra whitepaper modified mobile app store architecture with pro acti...
Tech mahindra whitepaper modified mobile app store architecture with pro acti...
anuragsinghal1981
Â
The Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t Ignore
Veracode
Â
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Aarkstore Enterprise
Â
Retail Industry Application Security Survey Insights
Retail Industry Application Security Survey Insights
Veracode
Â
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Bill Chamberlin
Â
Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...
Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...
IMARC Group
Â
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
Symantec
Â
Top 10 Mobile Application Development Trends In 2016
Top 10 Mobile Application Development Trends In 2016
V2Soft
Â
Enterprise endpoint security_market
Enterprise endpoint security_market
pallavi_1234
Â
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing Data
John Davis
Â
IT Security Trends in 2012
IT Security Trends in 2012
Icomm Technologies
Â
Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...
Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...
IMARC Group
Â
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
Symantec
Â
Unisys Security Insights Infographic: Global
Unisys Security Insights Infographic: Global
Unisys Corporation
Â
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape
mercatoradvisory
Â
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel Aviv
NOAH Advisors
Â
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...
Samsung Biz Mobile
Â
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Black Duck by Synopsys
Â
Cloud computing market
Cloud computing market
ReportCruxMarketRese
Â
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
Symantec
Â
Mobile app industry
Mobile app industry
sagarpd91
Â
Digital Generation: Security Infographic
Digital Generation: Security Infographic
Unisys Corporation
Â
Gartner Market Insights- Mobile Threat Defense and EMM
Gartner Market Insights- Mobile Threat Defense and EMM
Youssef Afzali
Â
The Internet of Things: Opportunity for Insurers
The Internet of Things: Opportunity for Insurers
Andrea Silvello
Â
Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...
bupbechanhgmail
Â
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology Innovations
IBM Software India
Â
More Related Content
What's hot
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Bill Chamberlin
Â
Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...
Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...
IMARC Group
Â
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
Symantec
Â
Top 10 Mobile Application Development Trends In 2016
Top 10 Mobile Application Development Trends In 2016
V2Soft
Â
Enterprise endpoint security_market
Enterprise endpoint security_market
pallavi_1234
Â
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing Data
John Davis
Â
IT Security Trends in 2012
IT Security Trends in 2012
Icomm Technologies
Â
Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...
Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...
IMARC Group
Â
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
Symantec
Â
Unisys Security Insights Infographic: Global
Unisys Security Insights Infographic: Global
Unisys Corporation
Â
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape
mercatoradvisory
Â
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel Aviv
NOAH Advisors
Â
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...
Samsung Biz Mobile
Â
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Black Duck by Synopsys
Â
Cloud computing market
Cloud computing market
ReportCruxMarketRese
Â
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
Symantec
Â
Mobile app industry
Mobile app industry
sagarpd91
Â
Digital Generation: Security Infographic
Digital Generation: Security Infographic
Unisys Corporation
Â
Gartner Market Insights- Mobile Threat Defense and EMM
Gartner Market Insights- Mobile Threat Defense and EMM
Youssef Afzali
Â
The Internet of Things: Opportunity for Insurers
The Internet of Things: Opportunity for Insurers
Andrea Silvello
Â
What's hot
(20)
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Â
Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...
Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...
Â
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
Â
Top 10 Mobile Application Development Trends In 2016
Top 10 Mobile Application Development Trends In 2016
Â
Enterprise endpoint security_market
Enterprise endpoint security_market
Â
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing Data
Â
IT Security Trends in 2012
IT Security Trends in 2012
Â
Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...
Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...
Â
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
Â
Unisys Security Insights Infographic: Global
Unisys Security Insights Infographic: Global
Â
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape
Â
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel Aviv
Â
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...
Â
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Â
Cloud computing market
Cloud computing market
Â
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
Â
Mobile app industry
Mobile app industry
Â
Digital Generation: Security Infographic
Digital Generation: Security Infographic
Â
Gartner Market Insights- Mobile Threat Defense and EMM
Gartner Market Insights- Mobile Threat Defense and EMM
Â
The Internet of Things: Opportunity for Insurers
The Internet of Things: Opportunity for Insurers
Â
Similar to Project 3:Government Mobile Apps Security Assessment & Strategy
Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...
bupbechanhgmail
Â
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology Innovations
IBM Software India
Â
F5 State of App Strategy Report 2023.pdf
F5 State of App Strategy Report 2023.pdf
Zeppos Galanos, MSc.
Â
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
accenture
Â
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
Utah Tech Labs
Â
Samsung_FCW GameChanger
Samsung_FCW GameChanger
Johnny Overcast
Â
The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019
Insights success media and technology pvt ltd
Â
Mobile App Development
Mobile App Development
mightymarketing
Â
Role of Mobility in Workplace Transformation
Role of Mobility in Workplace Transformation
AVI-SPL
Â
Mobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security Control
Tech Mahindra
Â
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD world
SAP Solution Extensions
Â
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
sciccone
Â
Selling Your Organization on Application Security
Selling Your Organization on Application Security
Veracode
Â
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
IMARC Group
Â
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
TestingXperts
Â
Strategic Private Cloud - When and Why
Strategic Private Cloud - When and Why
Mobile Labs
Â
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
Cisco Mobility
Â
IoT services in the automotive sector
IoT services in the automotive sector
PRIME
Â
State Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile Readiness
KloudData Inc
Â
Accelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise Mobility
Melissa Luongo
Â
Similar to Project 3:Government Mobile Apps Security Assessment & Strategy
(20)
Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...
Â
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology Innovations
Â
F5 State of App Strategy Report 2023.pdf
F5 State of App Strategy Report 2023.pdf
Â
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
Â
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
Â
Samsung_FCW GameChanger
Samsung_FCW GameChanger
Â
The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019
Â
Mobile App Development
Mobile App Development
Â
Role of Mobility in Workplace Transformation
Role of Mobility in Workplace Transformation
Â
Mobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security Control
Â
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD world
Â
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
Â
Selling Your Organization on Application Security
Selling Your Organization on Application Security
Â
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
Â
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
Â
Strategic Private Cloud - When and Why
Strategic Private Cloud - When and Why
Â
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
Â
IoT services in the automotive sector
IoT services in the automotive sector
Â
State Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile Readiness
Â
Accelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise Mobility
Â
More from Arshad ali
Tax655 final project_guidelines_and_rubric-converted (1)
Tax655 final project_guidelines_and_rubric-converted (1)
Arshad ali
Â
Liberty university psyc 210 quiz 1- 9
Liberty university psyc 210 quiz 1- 9
Arshad ali
Â
Bus520 assignment 1-converted
Bus520 assignment 1-converted
Arshad ali
Â
Open this link for solution
Open this link for solution
Arshad ali
Â
Solution
Solution
Arshad ali
Â
Criminal profiling
Criminal profiling
Arshad ali
Â
More from Arshad ali
(6)
Tax655 final project_guidelines_and_rubric-converted (1)
Tax655 final project_guidelines_and_rubric-converted (1)
Â
Liberty university psyc 210 quiz 1- 9
Liberty university psyc 210 quiz 1- 9
Â
Bus520 assignment 1-converted
Bus520 assignment 1-converted
Â
Open this link for solution
Open this link for solution
Â
Solution
Solution
Â
Criminal profiling
Criminal profiling
Â
Recently uploaded
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
Exhibitors Data
Â
Call Girls Hebbal Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
amitlee9823
Â
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
Ethan lee
Â
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
IlamathiKannappan
Â
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
Ravindra Nath Shukla
Â
Call Girls Electronic City Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Servi...
Call Girls Electronic City Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Servi...
amitlee9823
Â
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
Paul Menig
Â
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
Paul Menig
Â
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
Any kyc Account
Â
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Delhi Call girls
Â
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Abortion pills in Kuwait Cytotec pills in Kuwait
Â
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
Â
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
Ravindra Nath Shukla
Â
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
Neil Kimberley
Â
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
amitlee9823
Â
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
rajveerescorts2022
Â
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
P&CO
Â
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Dipal Arora
Â
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
Eric T. Tung
Â
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
priyanshujha201
Â
Recently uploaded
(20)
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
Â
Call Girls Hebbal Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
Â
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
Â
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
Â
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
Â
Call Girls Electronic City Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Servi...
Call Girls Electronic City Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Servi...
Â
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
Â
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
Â
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
Â
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Â
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Â
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Â
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
Â
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
Â
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
Â
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
Â
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
Â
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Â
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
Â
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
Â
Project 3:Government Mobile Apps Security Assessment & Strategy
1.
CSIA 360: Cybersecurity
in Government Organizations Copyright ©2019 by University of Maryland University College. All Rights Reserved Open this link for Solution https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security- Assessment--Strategy---2019 Project 3:Government Mobile Apps Security Assessment & Strategy For thisresearchreportyouwill researchandthenpresentyourfindingsaboutcybersecurity issuesspecifictomobile applications.Youwill alsoprovide asetof recommendationsforbestpractices (your“strategy”) forsecurityarchitecturesanddesignsformobile apps. Mobile applicationsare importantbecause theyallowcitizensandotherstakeholderstoaccess informationandservicesthroughthe federal government’sdigitalgovernmentinitiatives.Formore informationaboutrequirementstoprovide mobilefriendlywebsitesandmobile appssee thisblog postingfromCIO.GOV https://www.cio.gov/2018/08/13/design-accessibility.htmlandthe textof the ConnectedGovernmentActPublicLaw115-114 https://www.congress.gov/115/plaws/publ114/PLAW- 115publ114.pdf Note:thisassignmentrequiresinclusionof diagramsorgraphicswhichhelptoexplainthe informationprovidedinyouranalysisandstrategy.Youare notrequiredtocreate these onyour own. Instead,youshouldlookforuseful graphics/diagramsinthe readingsanduse those tosupportyour work.You mustcite the source foreach piece of artworkusedinyour project.Puta figure captionunder the diagramor chart and then place the in-textcitationatthe endof the caption.See the example atthe endof thisfile. Research: 1. Reviewthe Weeklyreadings. 2. ReviewrecentchangesinUSLaws regardingthe requirementformobilefriendlygovernment websites. a. https://www.congress.gov/115/plaws/publ114/PLAW-115publ114.pdf b. https://www.nextgov.com/ideas/2018/01/what-digital-government-cx-pros-should- know-about-connected-government-act/144987/ c. https://www.fedscoop.com/bill-mobile-friendly-government-websites-cruises-senate/ 3. Researchthe “best”of federal mobile appstosee examplesof the type of appsthatother agencies have createdinthe past. a. 19 of theCoolestGovernmentMobile Appshttps://www.govloop.com/community/blog/cool-gov-mobile-apps/ b. 10 MostEntertaining GovernmentMobileApps https://www.govloop.com/community/blog/10-most-entertaining-government-mobile- apps/ c. 3 Innovative WaysAgenciesare LeveragingMobile Apps http://fedscoop.com/great- government-mobile-apps
2.
CSIA 360: Cybersecurity
in Government Organizations Copyright ©2019 by University of Maryland University College. All Rights Reserved 4. Researchthe federal government’sperspective onmobileappsecurityarchitecturesanddesign recommendations.Here are three sourcestohelpyougetstarted: a. App Developers:Startwith Security https://www.ftc.gov/tips-advice/business-center/guidance/app-developers-start- security b. Mobile SecurityReference Architecture https://s3.amazonaws.com/sitesusa/wp- content/uploads/sites/1151/downloads/2013/05/Mobile-Security-Reference- Architecture.pdf c. Howto build a secure mobileapp:10 tips https://www.techrepublic.com/article/how-to-build-a-secure-mobile-app-10-tips/ 5. Researchindustryrecommendationsformobileappsecurity.Beginwiththe followingsources: a. OWASPMobileSecurity Projecthttps://www.owasp.org/index.php/OWASP_Mobile_Security_Project b. Top 10 MobileRisks(clickontab) https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mo bile_Risks c. Mobile app security:Alwayskeep the backdoor lockedhttp://arstechnica.com/security/2013/02/mobile-app-security-always-keep-the- back-door-locked/ 6. Findfive ormore bestpractice recommendationsforensuringthe securityof mobile apps.These recommendationsmustincludesecurityforthe platform(mobile device),the dataonthe device, and the transmissionpathbetweenthe device andthe mobile applicationserver.Yourfocusshould be upon recommendationswhichcanbe implementedaspartof a strategyforreducingrisk. Write: Write a five tosevenpage reportinwhichyousummarize yourresearchandpresentyour“best practices”basedstrategyforreducingriskand ensuringsecurityforgovernmentprovidedmobile apps and theirusers.Youshouldfocusuponclarityandconcisenessmore than lengthwhendetermining whatcontentto include inyourpaper.Ata minimum, yourreportmustinclude the following: 1. An introductionoroverview of mobileappsfordigital government.Youroverview shouldinclude discussionof the Connected GovernmentAct,examplesof mobile appswhichare recognizedas beinginnovative,and“bestof category”applicationsfordeliveringgovernmentinformationand servicestomobile devices.Thisintroductionshouldbe suitableforanexecutiveaudience. 2. A separate sectioninwhichyoudiscussthe federal government’srequirementsand recommendationsformobile appsecurityarchitecturesandthe associateddesign recommendations.Thissectionshouldbe writtenfornon-technical managers;youwill needto translate fromtech-speaktomanager-speak.Diagramsandpicturesmaybe useful but,remember to include the appropriate in-textcitationsforthe source (appendtothe figure caption).
3.
CSIA 360: Cybersecurity
in Government Organizations Copyright ©2019 by University of Maryland University College. All Rights Reserved 3. A separate sectioninwhichyoudiscussindustry’srecommendationsforsecurityarchitecturesand riskreductionformobile appsecurity. 4. A sectioninwhichyoupresent5 or morebestpracticerecommendationsforbuildingsecurityinto mobile applicationsusedtodelivergovernmentinformationandservices.These recommendations shouldbe presentedasastrategyfor reducingrisk. 5. A separate sectioninwhichyousummarize yourresearchandrecommendations. SubmitFor Grading Submityourworkin MS Word format (.docx or.doc file) usingthe Project3Assignmentinyour assignmentfolder.(Attachthe file.) Additional Information 1. Consultthe gradingrubricfor specificcontentandformattingrequirementsforthisassignment. 2. Your 5 to 7 page researchreportshouldbe professionalinappearance withconsistentuse of fonts,fontsizes,margins,etc.Youshoulduse headingsandpage breakstoorganize yourpaper. 3. Your papershoulduse standardtermsand definitionsforcybersecurity. 4. The CSIA programrecommendsthatyoufollow standardAPA formattingsince thiswill give you a documentthat meetsthe “professional appearance”requirements.APA formattingguidelines and examplesare foundunderCourse Resources>APA Resources.AnAPA template file (MS Word format) hasalso beenprovidedforyouruse CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx. 5. You mustinclude acover page withthe assignmenttitle,yourname,andthe due date.Your reference listmustbe ona separate page at the endof your file.These pagesdonotcount towardsthe assignment’spage count. 6. You are expectedtowrite grammaticallycorrectEnglishineveryassignmentthatyousubmitfor grading.Do not turnin anywork without(a) usingspell check,(b) usinggrammarcheck,(c) verifyingthatyourpunctuationiscorrectand(d) reviewingyourworkforcorrectword usage and correctlystructuredsentencesandparagraphs. 7. Credityoursourcesusingin-textcitationsandreference listentries.Bothyourcitationsandyour reference listentriesmustfollow aconsistentcitationstyle(APA,MLA,etc.). Example Diagram with Citation and Reference ListEntry
4.
CSIA 360: Cybersecurity
in Government Organizations Copyright ©2019 by University of Maryland University College. All Rights Reserved Figure 1. Enterprise Core Services (Adapted from Figure 1 in CIO Council, 2013, p. 5) Federal CIOCouncil &Departmentof HomelandSecurity.(2013). Mobilesecurity referencearchitecture. Retrievedfrom https://s3.amazonaws.com/sitesusa/wp-content/uploads/sites/1151/ downloads/2013/05/Mobile-Security-Reference-Architecture.pdf Open this link for Solution https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security- Assessment--Strategy---2019 Open this link for Solution https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security- Assessment--Strategy---2019 Open this link for Solution https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security- Assessment--Strategy---2019
Download now