Provide an overview of what the app is

Assignment Help Management Information Sys
Reference no: EM131703990

Assignment : Security Analysis of an App

The goal of this report is to analyze the permissions of a specific app that is available to public via official app markets from the information security perspective. For this assignment, select an app.

Your app should not be already selected by any other student. A list of the apps that are already selected is available in Blackboard in the same location as the assignment instructions. Once selected, confirm your selected app with the course instructor so that it would be added to the list of the selected apps.

For your selected app, please discuss the following:

• Provide an overview of what the app is/does.

• List the permissions that the app requires (e.g. access to camera, contacts, etc.)

• For each of those permissions explain whether that permission is necessary for proper functioning of the app and why.

• For each permission discuss the potential cyber security issues that can arise due to that permission if the app is compromised.

• As a cybersecurity analyst, discuss what would be the minimum permissions for the app to be able to function properly without having unnecessary permissions/access privileges.

• Review the EULA (End User License Agreement) of the application and answer the following questions.

o Please provide a summary of EULA. Highlight the key/interesting findings.

o If you were the app provider, what changes would you make to the EULA?

o As a potential user of the app, what changes would you make to the EULA?

• Assume that you are a cybersecurity analyst in an organization and are devising the BYOD policy of the organization. What are the potential security issues associated with employees' use of the app on the organization's computing devices or through the organization's network? Please explain.

• As an organization's cybersecurity analyst, would you recommend allowing or prohibiting the use of the app on the organization's devices? Please explain why.

• As an organization's cybersecurity analyst, what actions would you recommend to prevent the potential threats associated with the selected app?

In your report, please reference any security incidents related to the app that has already occurred (if there has been any).

Please keep in mind that the goal of the assignment is not simply describing an instance of security incident but it is analyzing the potential security issues that can arise from the permissions granted to an app.

Format Information: Please adhere to the following format guidelines in preparing your report.

1. The report is to have a cover sheet that identifies:

a. the author's name

b. the title of the report

c. the semester and year during which the paper was submitted

2. The length of papers should range from 700 to 1,000 words (excluding references).

3. Use single space, 12-point font size and allow approximately one-inch margins

4. Include a references section

5. Incorporate APA style for references and citations (in the essay)

Reference no: EM131703990

Questions Cloud

What is meant by the term person-job fit : What is meant by the term "person-job fit". If there isn't a good person-job fit, what are some ways to resolve the situation
How much is the bond worth : This looks good so far but if he requires a YTM of 7.6% how much is the bond worth to him? Would you recommend he purchase it?
Basics of business and corporate strategy : What are the basics of business and corporate strategy? And what are some of the potential benefits or harms to an organization?
What makes the officer love the crime prevention work : What you learned from the interview. What makes the officer love the crime prevention work? What the officer have leant from the mistakes in crime prevention?
Provide an overview of what the app is : For each permission discuss the potential cyber security issues that can arise due to that permission if the app is compromised.
Important aspects of a tqm methodology : In your response to student postings pose a question that probes their logic and asks a critical question.
Do you agree with the statement : Internet is believed to boost the efficiency and effectiveness of any business.
Discuss the hundred years war : Discuss the Hundred Years War: What were its causes. Why did the war continue for so long a period. What advantages did each side possess
Unlocking the future of fuel : What would be a pro and a con of the strategy put forth in the article, "Unlocking the Future of Fuel: Turning Variable Costs into Fixed Costs."

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd