SlideShare a Scribd company logo
CSIA 360: Cybersecurity in Government Organizations
Copyright ©2019 by University of Maryland University College. All Rights Reserved
Open this link for Solution
https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security-
Assessment--Strategy---2019
Project 3:Government Mobile Apps Security Assessment & Strategy
For thisresearchreportyouwill researchandthenpresentyourfindingsaboutcybersecurity
issuesspecifictomobile applications.Youwill alsoprovide asetof recommendationsforbestpractices
(your“strategy”) forsecurityarchitecturesanddesignsformobile apps.
Mobile applicationsare importantbecause theyallowcitizensandotherstakeholderstoaccess
informationandservicesthroughthe federal government’sdigitalgovernmentinitiatives.Formore
informationaboutrequirementstoprovide mobilefriendlywebsitesandmobile appssee thisblog
postingfromCIO.GOV https://www.cio.gov/2018/08/13/design-accessibility.htmlandthe textof the
ConnectedGovernmentActPublicLaw115-114 https://www.congress.gov/115/plaws/publ114/PLAW-
115publ114.pdf
Note:thisassignmentrequiresinclusionof diagramsorgraphicswhichhelptoexplainthe
informationprovidedinyouranalysisandstrategy.Youare notrequiredtocreate these onyour own.
Instead,youshouldlookforuseful graphics/diagramsinthe readingsanduse those tosupportyour
work.You mustcite the source foreach piece of artworkusedinyour project.Puta figure captionunder
the diagramor chart and then place the in-textcitationatthe endof the caption.See the example atthe
endof thisfile.
Research:
1. Reviewthe Weeklyreadings.
2. ReviewrecentchangesinUSLaws regardingthe requirementformobilefriendlygovernment
websites.
a. https://www.congress.gov/115/plaws/publ114/PLAW-115publ114.pdf
b. https://www.nextgov.com/ideas/2018/01/what-digital-government-cx-pros-should-
know-about-connected-government-act/144987/
c. https://www.fedscoop.com/bill-mobile-friendly-government-websites-cruises-senate/
3. Researchthe “best”of federal mobile appstosee examplesof the type of appsthatother agencies
have createdinthe past.
a. 19 of theCoolestGovernmentMobile
Appshttps://www.govloop.com/community/blog/cool-gov-mobile-apps/
b. 10 MostEntertaining GovernmentMobileApps
https://www.govloop.com/community/blog/10-most-entertaining-government-mobile-
apps/
c. 3 Innovative WaysAgenciesare LeveragingMobile Apps http://fedscoop.com/great-
government-mobile-apps
CSIA 360: Cybersecurity in Government Organizations
Copyright ©2019 by University of Maryland University College. All Rights Reserved
4. Researchthe federal government’sperspective onmobileappsecurityarchitecturesanddesign
recommendations.Here are three sourcestohelpyougetstarted:
a. App Developers:Startwith Security
https://www.ftc.gov/tips-advice/business-center/guidance/app-developers-start-
security
b. Mobile SecurityReference Architecture
https://s3.amazonaws.com/sitesusa/wp-
content/uploads/sites/1151/downloads/2013/05/Mobile-Security-Reference-
Architecture.pdf
c. Howto build a secure mobileapp:10 tips
https://www.techrepublic.com/article/how-to-build-a-secure-mobile-app-10-tips/
5. Researchindustryrecommendationsformobileappsecurity.Beginwiththe followingsources:
a. OWASPMobileSecurity
Projecthttps://www.owasp.org/index.php/OWASP_Mobile_Security_Project
b. Top 10 MobileRisks(clickontab)
https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mo
bile_Risks
c. Mobile app security:Alwayskeep the backdoor
lockedhttp://arstechnica.com/security/2013/02/mobile-app-security-always-keep-the-
back-door-locked/
6. Findfive ormore bestpractice recommendationsforensuringthe securityof mobile apps.These
recommendationsmustincludesecurityforthe platform(mobile device),the dataonthe device,
and the transmissionpathbetweenthe device andthe mobile applicationserver.Yourfocusshould
be upon recommendationswhichcanbe implementedaspartof a strategyforreducingrisk.
Write:
Write a five tosevenpage reportinwhichyousummarize yourresearchandpresentyour“best
practices”basedstrategyforreducingriskand ensuringsecurityforgovernmentprovidedmobile apps
and theirusers.Youshouldfocusuponclarityandconcisenessmore than lengthwhendetermining
whatcontentto include inyourpaper.Ata minimum, yourreportmustinclude the following:
1. An introductionoroverview of mobileappsfordigital government.Youroverview shouldinclude
discussionof the Connected GovernmentAct,examplesof mobile appswhichare recognizedas
beinginnovative,and“bestof category”applicationsfordeliveringgovernmentinformationand
servicestomobile devices.Thisintroductionshouldbe suitableforanexecutiveaudience.
2. A separate sectioninwhichyoudiscussthe federal government’srequirementsand
recommendationsformobile appsecurityarchitecturesandthe associateddesign
recommendations.Thissectionshouldbe writtenfornon-technical managers;youwill needto
translate fromtech-speaktomanager-speak.Diagramsandpicturesmaybe useful but,remember
to include the appropriate in-textcitationsforthe source (appendtothe figure caption).
CSIA 360: Cybersecurity in Government Organizations
Copyright ©2019 by University of Maryland University College. All Rights Reserved
3. A separate sectioninwhichyoudiscussindustry’srecommendationsforsecurityarchitecturesand
riskreductionformobile appsecurity.
4. A sectioninwhichyoupresent5 or morebestpracticerecommendationsforbuildingsecurityinto
mobile applicationsusedtodelivergovernmentinformationandservices.These recommendations
shouldbe presentedasastrategyfor reducingrisk.
5. A separate sectioninwhichyousummarize yourresearchandrecommendations.
SubmitFor Grading
Submityourworkin MS Word format (.docx or.doc file) usingthe Project3Assignmentinyour
assignmentfolder.(Attachthe file.)
Additional Information
1. Consultthe gradingrubricfor specificcontentandformattingrequirementsforthisassignment.
2. Your 5 to 7 page researchreportshouldbe professionalinappearance withconsistentuse of
fonts,fontsizes,margins,etc.Youshoulduse headingsandpage breakstoorganize yourpaper.
3. Your papershoulduse standardtermsand definitionsforcybersecurity.
4. The CSIA programrecommendsthatyoufollow standardAPA formattingsince thiswill give you
a documentthat meetsthe “professional appearance”requirements.APA formattingguidelines
and examplesare foundunderCourse Resources>APA Resources.AnAPA template file (MS
Word format) hasalso beenprovidedforyouruse
CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx.
5. You mustinclude acover page withthe assignmenttitle,yourname,andthe due date.Your
reference listmustbe ona separate page at the endof your file.These pagesdonotcount
towardsthe assignment’spage count.
6. You are expectedtowrite grammaticallycorrectEnglishineveryassignmentthatyousubmitfor
grading.Do not turnin anywork without(a) usingspell check,(b) usinggrammarcheck,(c)
verifyingthatyourpunctuationiscorrectand(d) reviewingyourworkforcorrectword usage
and correctlystructuredsentencesandparagraphs.
7. Credityoursourcesusingin-textcitationsandreference listentries.Bothyourcitationsandyour
reference listentriesmustfollow aconsistentcitationstyle(APA,MLA,etc.).
Example Diagram with Citation and Reference ListEntry
CSIA 360: Cybersecurity in Government Organizations
Copyright ©2019 by University of Maryland University College. All Rights Reserved
Figure 1. Enterprise Core Services (Adapted from Figure 1 in CIO Council, 2013, p. 5)
Federal CIOCouncil &Departmentof HomelandSecurity.(2013). Mobilesecurity referencearchitecture.
Retrievedfrom https://s3.amazonaws.com/sitesusa/wp-content/uploads/sites/1151/
downloads/2013/05/Mobile-Security-Reference-Architecture.pdf
Open this link for Solution
https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security-
Assessment--Strategy---2019
Open this link for Solution
https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security-
Assessment--Strategy---2019
Open this link for Solution
https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security-
Assessment--Strategy---2019

More Related Content

What's hot

Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Bill Chamberlin
 
Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...
Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...
Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...
IMARC Group
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
Symantec
 
Top 10 Mobile Application Development Trends In 2016
Top 10 Mobile Application Development Trends In 2016Top 10 Mobile Application Development Trends In 2016
Top 10 Mobile Application Development Trends In 2016
V2Soft
 
Enterprise endpoint security_market
Enterprise endpoint security_marketEnterprise endpoint security_market
Enterprise endpoint security_market
pallavi_1234
 
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataApp Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing Data
John Davis
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
Icomm Technologies
 
Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...
Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...
Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...
IMARC Group
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
Symantec
 
Unisys Security Insights Infographic: Global
Unisys Security Insights Infographic: GlobalUnisys Security Insights Infographic: Global
Unisys Security Insights Infographic: Global
Unisys Corporation
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape
mercatoradvisory
 
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivSentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel Aviv
NOAH Advisors
 
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...
Samsung Biz Mobile
 
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Black Duck by Synopsys
 
Cloud computing market
Cloud computing marketCloud computing market
Cloud computing market
ReportCruxMarketRese
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
Symantec
 
Mobile app industry
Mobile app industryMobile app industry
Mobile app industry
sagarpd91
 
Digital Generation: Security Infographic
Digital Generation: Security InfographicDigital Generation: Security Infographic
Digital Generation: Security Infographic
Unisys Corporation
 
Gartner Market Insights- Mobile Threat Defense and EMM
Gartner Market Insights- Mobile Threat Defense and EMMGartner Market Insights- Mobile Threat Defense and EMM
Gartner Market Insights- Mobile Threat Defense and EMM
Youssef Afzali
 
The Internet of Things: Opportunity for Insurers
The Internet of Things: Opportunity for InsurersThe Internet of Things: Opportunity for Insurers
The Internet of Things: Opportunity for Insurers
Andrea Silvello
 

What's hot (20)

Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
 
Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...
Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...
Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
Top 10 Mobile Application Development Trends In 2016
Top 10 Mobile Application Development Trends In 2016Top 10 Mobile Application Development Trends In 2016
Top 10 Mobile Application Development Trends In 2016
 
Enterprise endpoint security_market
Enterprise endpoint security_marketEnterprise endpoint security_market
Enterprise endpoint security_market
 
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataApp Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing Data
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...
Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...
Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
 
Unisys Security Insights Infographic: Global
Unisys Security Insights Infographic: GlobalUnisys Security Insights Infographic: Global
Unisys Security Insights Infographic: Global
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape
 
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivSentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel Aviv
 
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...
 
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
 
Cloud computing market
Cloud computing marketCloud computing market
Cloud computing market
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
 
Mobile app industry
Mobile app industryMobile app industry
Mobile app industry
 
Digital Generation: Security Infographic
Digital Generation: Security InfographicDigital Generation: Security Infographic
Digital Generation: Security Infographic
 
Gartner Market Insights- Mobile Threat Defense and EMM
Gartner Market Insights- Mobile Threat Defense and EMMGartner Market Insights- Mobile Threat Defense and EMM
Gartner Market Insights- Mobile Threat Defense and EMM
 
The Internet of Things: Opportunity for Insurers
The Internet of Things: Opportunity for InsurersThe Internet of Things: Opportunity for Insurers
The Internet of Things: Opportunity for Insurers
 

Similar to Project 3:Government Mobile Apps Security Assessment & Strategy

Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...
bupbechanhgmail
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology Innovations
IBM Software India
 
F5 State of App Strategy Report 2023.pdf
F5 State of App Strategy Report 2023.pdfF5 State of App Strategy Report 2023.pdf
F5 State of App Strategy Report 2023.pdf
Zeppos Galanos, MSc.
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
accenture
 
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
Utah Tech Labs
 
Samsung_FCW GameChanger
Samsung_FCW GameChangerSamsung_FCW GameChanger
Samsung_FCW GameChanger
Johnny Overcast
 
The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019
Insights success media and technology pvt ltd
 
Mobile App Development
Mobile App DevelopmentMobile App Development
Mobile App Development
mightymarketing
 
Role of Mobility in Workplace Transformation
Role of Mobility in Workplace TransformationRole of Mobility in Workplace Transformation
Role of Mobility in Workplace Transformation
AVI-SPL
 
Mobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security ControlMobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security Control
Tech Mahindra
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
SAP Solution Extensions
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
sciccone
 
Selling Your Organization on Application Security
Selling Your Organization on Application SecuritySelling Your Organization on Application Security
Selling Your Organization on Application Security
Veracode
 
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
IMARC Group
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
TestingXperts
 
Strategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyStrategic Private Cloud - When and Why
Strategic Private Cloud - When and Why
Mobile Labs
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
Cisco Mobility
 
IoT services in the automotive sector
IoT services in the automotive sectorIoT services in the automotive sector
IoT services in the automotive sector
PRIME
 
State Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile ReadinessState Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile Readiness
KloudData Inc
 
Accelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise MobilityAccelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise Mobility
Melissa Luongo
 

Similar to Project 3:Government Mobile Apps Security Assessment & Strategy (20)

Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology Innovations
 
F5 State of App Strategy Report 2023.pdf
F5 State of App Strategy Report 2023.pdfF5 State of App Strategy Report 2023.pdf
F5 State of App Strategy Report 2023.pdf
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
 
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
 
Samsung_FCW GameChanger
Samsung_FCW GameChangerSamsung_FCW GameChanger
Samsung_FCW GameChanger
 
The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019
 
Mobile App Development
Mobile App DevelopmentMobile App Development
Mobile App Development
 
Role of Mobility in Workplace Transformation
Role of Mobility in Workplace TransformationRole of Mobility in Workplace Transformation
Role of Mobility in Workplace Transformation
 
Mobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security ControlMobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security Control
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
 
Selling Your Organization on Application Security
Selling Your Organization on Application SecuritySelling Your Organization on Application Security
Selling Your Organization on Application Security
 
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Strategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyStrategic Private Cloud - When and Why
Strategic Private Cloud - When and Why
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
IoT services in the automotive sector
IoT services in the automotive sectorIoT services in the automotive sector
IoT services in the automotive sector
 
State Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile ReadinessState Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile Readiness
 
Accelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise MobilityAccelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise Mobility
 

More from Arshad ali

Tax655 final project_guidelines_and_rubric-converted (1)
Tax655 final project_guidelines_and_rubric-converted (1)Tax655 final project_guidelines_and_rubric-converted (1)
Tax655 final project_guidelines_and_rubric-converted (1)
Arshad ali
 
Liberty university psyc 210 quiz 1- 9
Liberty university psyc 210 quiz 1- 9Liberty university psyc 210 quiz 1- 9
Liberty university psyc 210 quiz 1- 9
Arshad ali
 
Bus520 assignment 1-converted
Bus520 assignment 1-convertedBus520 assignment 1-converted
Bus520 assignment 1-converted
Arshad ali
 
Open this link for solution
Open this link for solutionOpen this link for solution
Open this link for solution
Arshad ali
 
Solution
SolutionSolution
Solution
Arshad ali
 
Criminal profiling
Criminal profilingCriminal profiling
Criminal profiling
Arshad ali
 

More from Arshad ali (6)

Tax655 final project_guidelines_and_rubric-converted (1)
Tax655 final project_guidelines_and_rubric-converted (1)Tax655 final project_guidelines_and_rubric-converted (1)
Tax655 final project_guidelines_and_rubric-converted (1)
 
Liberty university psyc 210 quiz 1- 9
Liberty university psyc 210 quiz 1- 9Liberty university psyc 210 quiz 1- 9
Liberty university psyc 210 quiz 1- 9
 
Bus520 assignment 1-converted
Bus520 assignment 1-convertedBus520 assignment 1-converted
Bus520 assignment 1-converted
 
Open this link for solution
Open this link for solutionOpen this link for solution
Open this link for solution
 
Solution
SolutionSolution
Solution
 
Criminal profiling
Criminal profilingCriminal profiling
Criminal profiling
 

Recently uploaded

HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdfHOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
46adnanshahzad
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
Christian Dahlen
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
ecamare2
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
my Pandit
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
Top Forex Brokers Review
 
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
Stephen Cashman
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
taqyea
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
Kirill Klimov
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
hartfordclub1
 
How to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM SoftwareHow to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM Software
SalesTown
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
MJ Global
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Kalyan Satta Matka Guessing Matka Result Main Bazar chart
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
Operational Excellence Consulting
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
DerekIwanaka1
 

Recently uploaded (20)

HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdfHOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
 
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
 
How to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM SoftwareHow to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM Software
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
 

Project 3:Government Mobile Apps Security Assessment & Strategy

  • 1. CSIA 360: Cybersecurity in Government Organizations Copyright ©2019 by University of Maryland University College. All Rights Reserved Open this link for Solution https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security- Assessment--Strategy---2019 Project 3:Government Mobile Apps Security Assessment & Strategy For thisresearchreportyouwill researchandthenpresentyourfindingsaboutcybersecurity issuesspecifictomobile applications.Youwill alsoprovide asetof recommendationsforbestpractices (your“strategy”) forsecurityarchitecturesanddesignsformobile apps. Mobile applicationsare importantbecause theyallowcitizensandotherstakeholderstoaccess informationandservicesthroughthe federal government’sdigitalgovernmentinitiatives.Formore informationaboutrequirementstoprovide mobilefriendlywebsitesandmobile appssee thisblog postingfromCIO.GOV https://www.cio.gov/2018/08/13/design-accessibility.htmlandthe textof the ConnectedGovernmentActPublicLaw115-114 https://www.congress.gov/115/plaws/publ114/PLAW- 115publ114.pdf Note:thisassignmentrequiresinclusionof diagramsorgraphicswhichhelptoexplainthe informationprovidedinyouranalysisandstrategy.Youare notrequiredtocreate these onyour own. Instead,youshouldlookforuseful graphics/diagramsinthe readingsanduse those tosupportyour work.You mustcite the source foreach piece of artworkusedinyour project.Puta figure captionunder the diagramor chart and then place the in-textcitationatthe endof the caption.See the example atthe endof thisfile. Research: 1. Reviewthe Weeklyreadings. 2. ReviewrecentchangesinUSLaws regardingthe requirementformobilefriendlygovernment websites. a. https://www.congress.gov/115/plaws/publ114/PLAW-115publ114.pdf b. https://www.nextgov.com/ideas/2018/01/what-digital-government-cx-pros-should- know-about-connected-government-act/144987/ c. https://www.fedscoop.com/bill-mobile-friendly-government-websites-cruises-senate/ 3. Researchthe “best”of federal mobile appstosee examplesof the type of appsthatother agencies have createdinthe past. a. 19 of theCoolestGovernmentMobile Appshttps://www.govloop.com/community/blog/cool-gov-mobile-apps/ b. 10 MostEntertaining GovernmentMobileApps https://www.govloop.com/community/blog/10-most-entertaining-government-mobile- apps/ c. 3 Innovative WaysAgenciesare LeveragingMobile Apps http://fedscoop.com/great- government-mobile-apps
  • 2. CSIA 360: Cybersecurity in Government Organizations Copyright ©2019 by University of Maryland University College. All Rights Reserved 4. Researchthe federal government’sperspective onmobileappsecurityarchitecturesanddesign recommendations.Here are three sourcestohelpyougetstarted: a. App Developers:Startwith Security https://www.ftc.gov/tips-advice/business-center/guidance/app-developers-start- security b. Mobile SecurityReference Architecture https://s3.amazonaws.com/sitesusa/wp- content/uploads/sites/1151/downloads/2013/05/Mobile-Security-Reference- Architecture.pdf c. Howto build a secure mobileapp:10 tips https://www.techrepublic.com/article/how-to-build-a-secure-mobile-app-10-tips/ 5. Researchindustryrecommendationsformobileappsecurity.Beginwiththe followingsources: a. OWASPMobileSecurity Projecthttps://www.owasp.org/index.php/OWASP_Mobile_Security_Project b. Top 10 MobileRisks(clickontab) https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mo bile_Risks c. Mobile app security:Alwayskeep the backdoor lockedhttp://arstechnica.com/security/2013/02/mobile-app-security-always-keep-the- back-door-locked/ 6. Findfive ormore bestpractice recommendationsforensuringthe securityof mobile apps.These recommendationsmustincludesecurityforthe platform(mobile device),the dataonthe device, and the transmissionpathbetweenthe device andthe mobile applicationserver.Yourfocusshould be upon recommendationswhichcanbe implementedaspartof a strategyforreducingrisk. Write: Write a five tosevenpage reportinwhichyousummarize yourresearchandpresentyour“best practices”basedstrategyforreducingriskand ensuringsecurityforgovernmentprovidedmobile apps and theirusers.Youshouldfocusuponclarityandconcisenessmore than lengthwhendetermining whatcontentto include inyourpaper.Ata minimum, yourreportmustinclude the following: 1. An introductionoroverview of mobileappsfordigital government.Youroverview shouldinclude discussionof the Connected GovernmentAct,examplesof mobile appswhichare recognizedas beinginnovative,and“bestof category”applicationsfordeliveringgovernmentinformationand servicestomobile devices.Thisintroductionshouldbe suitableforanexecutiveaudience. 2. A separate sectioninwhichyoudiscussthe federal government’srequirementsand recommendationsformobile appsecurityarchitecturesandthe associateddesign recommendations.Thissectionshouldbe writtenfornon-technical managers;youwill needto translate fromtech-speaktomanager-speak.Diagramsandpicturesmaybe useful but,remember to include the appropriate in-textcitationsforthe source (appendtothe figure caption).
  • 3. CSIA 360: Cybersecurity in Government Organizations Copyright ©2019 by University of Maryland University College. All Rights Reserved 3. A separate sectioninwhichyoudiscussindustry’srecommendationsforsecurityarchitecturesand riskreductionformobile appsecurity. 4. A sectioninwhichyoupresent5 or morebestpracticerecommendationsforbuildingsecurityinto mobile applicationsusedtodelivergovernmentinformationandservices.These recommendations shouldbe presentedasastrategyfor reducingrisk. 5. A separate sectioninwhichyousummarize yourresearchandrecommendations. SubmitFor Grading Submityourworkin MS Word format (.docx or.doc file) usingthe Project3Assignmentinyour assignmentfolder.(Attachthe file.) Additional Information 1. Consultthe gradingrubricfor specificcontentandformattingrequirementsforthisassignment. 2. Your 5 to 7 page researchreportshouldbe professionalinappearance withconsistentuse of fonts,fontsizes,margins,etc.Youshoulduse headingsandpage breakstoorganize yourpaper. 3. Your papershoulduse standardtermsand definitionsforcybersecurity. 4. The CSIA programrecommendsthatyoufollow standardAPA formattingsince thiswill give you a documentthat meetsthe “professional appearance”requirements.APA formattingguidelines and examplesare foundunderCourse Resources>APA Resources.AnAPA template file (MS Word format) hasalso beenprovidedforyouruse CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx. 5. You mustinclude acover page withthe assignmenttitle,yourname,andthe due date.Your reference listmustbe ona separate page at the endof your file.These pagesdonotcount towardsthe assignment’spage count. 6. You are expectedtowrite grammaticallycorrectEnglishineveryassignmentthatyousubmitfor grading.Do not turnin anywork without(a) usingspell check,(b) usinggrammarcheck,(c) verifyingthatyourpunctuationiscorrectand(d) reviewingyourworkforcorrectword usage and correctlystructuredsentencesandparagraphs. 7. Credityoursourcesusingin-textcitationsandreference listentries.Bothyourcitationsandyour reference listentriesmustfollow aconsistentcitationstyle(APA,MLA,etc.). Example Diagram with Citation and Reference ListEntry
  • 4. CSIA 360: Cybersecurity in Government Organizations Copyright ©2019 by University of Maryland University College. All Rights Reserved Figure 1. Enterprise Core Services (Adapted from Figure 1 in CIO Council, 2013, p. 5) Federal CIOCouncil &Departmentof HomelandSecurity.(2013). Mobilesecurity referencearchitecture. Retrievedfrom https://s3.amazonaws.com/sitesusa/wp-content/uploads/sites/1151/ downloads/2013/05/Mobile-Security-Reference-Architecture.pdf Open this link for Solution https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security- Assessment--Strategy---2019 Open this link for Solution https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security- Assessment--Strategy---2019 Open this link for Solution https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security- Assessment--Strategy---2019