Government Mobile Apps Security Assessment

Assignment Help Computer Network Security
Reference no: EM132656651

CSIA360 Cybersecurity in Government Organizations - University of Maryland Global Campus

Project: Government Mobile Apps Security Assessment & Strategy

For this research report you will research and then present your findings about cybersecurity issues specific to mobile applications. You will also provide a set of recommendations for best practices (your "strategy") for security architectures and designs formobile apps.

Mobile applications are important because they allow citizens and other stakeholders to access information and services through the federal government's digital government initiatives. For more information about requirements to provide mobile friendly websites and mobile apps see this blog posting and the text of the Connected Government Act Public Law.

Note: this assignment requires inclusion of diagrams or graphics that help to explain the information provided in your analysis and strategy. You are not required to create these on your own. Instead, you should look for useful graphics/diagrams in the readings and use those to support your work. You must cite the source for each piece of artwork used in your project. Put a figure caption under the diagram or chart and then place the in-text citation at the end of the caption. See the example at the end of this file.

Research:

1. Review the Weekly readings.

2. Review recent changes in US Laws regarding the requirement for mobile friendly government websites.

3. Research the "best" of federal mobile apps to see examples of the type of apps that other agencies have created in the past.
a. 19 of the Coolest Government Mobile Apps
b. 10 Most Entertaining Government Mobile Apps
c. The Best Government Mobile Apps for Business...and Your Office
d. 3 Innovative Ways Agencies are Leveraging Mobile Apps
4. Research the federal government's perspective on mobile app security architectures and design recommendations. Here are three sources to help you get started:
a. App Developers: Start with Security
b. Mobile Security Reference Architecture
c. How to build a secure mobile app: 10 tips
d. 2019 Mobile Security R&D Program Guide
5. Research industry recommendations for mobile app security. Begin with the following sources:
a. OWASP Mobile Security Project
b. Top 10 Mobile Risks(click on tab)
c. Mobile app security: Always keep the back door locked
6. Find five or more best practice recommendations for ensuring the security of mobile apps. These recommendations must include security for the platform (mobile device), the data on the device, and the transmission path between the device and the mobile application server. Your focus should be upon recommendations that can be implemented as part of a strategy for reducing risk.
Write:
Write a five to sevenpagereport in which you summarize your research and present your "best practices" based strategy for reducing risk and ensuring security forgovernment provided mobile apps and their users. You should focus upon clarity and conciseness more than length when determining what content to include in your paper. At a minimum, your report must include the following:

1. An introduction or overview of mobile apps for digital government.Include 5 or more examples of mobile apps recognized as being innovative or "best of category" applications for delivering government information and services to mobile devices.This introduction should be suitable for an executive audience.

2. A separate section in which you discuss the federal government's requirements and recommendations for mobile app security architectures and the associated design recommendations. Write this section for non-technical managers; you will need to translate from tech-speak to manager-speak. Include at least three diagrams or pictures in this section and remember to include the appropriate in-text citations for the source (append to the figure caption).

3. A separate section in which you discuss industry's recommendations for security architectures and risk reduction for mobile app security. Write this section for non-technical managers; you will need to translate from tech-speak to manager-speak. Include at least three diagrams or pictures in this section and remember to include the appropriate in-text citations for the source (append to the figure caption).

4. A section in which you present 5 or morebest practice recommendations for building security (the confidentiality, integrity, availability, authenticity, and non-repudiation for Mobile Applications) into mobile applications used to deliver government information and services. Present these strategies as recommendations for reducing risk.

5. A separate section in which you summarize your research and recommendations.

Attachment:- Government Mobile Apps Security Assessment & Strategy.rar

Reference no: EM132656651

Questions Cloud

Compute the annual after-tax cost of each option : Trent's income tax rate is 21 percent. Compute the annual after-tax cost of each option and indicate which minimizes the after-tax cost of obtaining the worker
Practical advice about preparing for interviews : Summarize the information and add your thoughts to what the experts say. Be sure to also include your own interview preparation experiences.
Compare methodologies in the formation of a partnership : When two or more individuals come together to form a partnership, compare these methodologies in the formation of a partnership. Feel free to use examples
Organization network using untrusted WANs : Discuss the risks associated with allowing remote users to access the Organization's network using untrusted WANs.
Government Mobile Apps Security Assessment : Government Mobile Apps Security Assessment & Strategy - present your findings about cybersecurity issues specific to mobile applications. You will also provide
Define internal and external environments : Define internal and external environments. How do they relate back to the various theories you have seen?
Compute whispering diluted earnings per share : The preferred stock pays an annual dividend of $5 per share. Whispering's tax rate is 30%. Compute Whispering diluted earnings per share
How behaviors and values were shaped by the five agent : How your behaviors, beliefs, values were shaped by the 5 agents of socialization family. Socialization has 2 main purposes - pass on the culture and development
Organize-implement and maintain IT security policies : Describe how to design, organize, implement, and maintain IT security policies.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd