Strategy for reducing risk

Assignment Help Computer Network Security
Reference no: EM132545559 , Length: 6 pages

CSIA360 Cybersecurity in Government Organizations - University of Maryland Global Campus

Project: Government Mobile Apps Security Assessment & Strategy

For this research report you will research and then present your findings about cybersecurity issues specific to mobile applications. You will also provide a set of recommendations for best practices (your "strategy") for security architectures and designs formobile apps.

Mobile applications are important because they allow citizens and other stakeholders to access information and services through the federal government's digital government initiatives. For more information about requirements to provide mobile friendly websites and mobile apps see this blog posting from GSA.GOV

Research:

1. Review the Weekly readings.

2. Review recent changes in US Laws regarding the requirement for mobile friendly government websites.

3. Research the "best" of federal mobile apps to see examples of the type of apps that other agencies have created in the past.
a. 19 of the Coolest Government Mobile
b. 10 Most Entertaining Government Mobile Apps
c. The Best Government Mobile Apps for Business...and Your Office
d. 3 Innovative Ways Agencies are Leveraging Mobile Apps

4. Research the federal government's perspective on mobile app security architectures and design recommendations. Here are three sources to help you get started:
a. App Developers: Start with Security
b. Mobile Security Reference Architecture
c. How to build a secure mobile app: 10 tips

5. Research industry recommendations for mobile app security. Begin with the following sources:
a. OWASP Mobile Security
b. Top 10 Mobile Risks(click on tab)
c. Mobile app security: Always keep the back door

6. Find five or more best practice recommendations for ensuring the security of mobile apps. These recommendations must include security for the platform (mobile device), the data on the device, and the transmission path between the device and the mobile application server. Your focus should be upon recommendations that can be implemented as part of a strategy for reducing risk.
Write:

Write a five to sevenpage report in which you summarize your research and present your "best practices" based strategy for reducing risk and ensuring security for government provided mobile apps and their users. You should focus upon clarity and conciseness more than length when determining what content to include in your paper. At a minimum, your report must include the following:

1. An introduction or overview of mobile apps for digital government.Include 5 or more examples of mobile apps recognized as being innovative or "best of category" applications for delivering government information and services to mobile devices.This introduction should be suitable for an executive audience.

2. A separate section in which you discuss the federal government's requirements and recommendations for mobile app security architectures and the associated design recommendations. Write this section for non-technical managers; you will need to translate from tech-speak to manager-speak. Include at least three diagrams or pictures in this section and remember to include the appropriate in-text citations for the source (append to the figure caption).

3. A separate section in which you discuss industry's recommendations for security architectures and risk reduction for mobile app security. Write this section for non-technical managers; you will need to translate from tech-speak to manager-speak. Include at least three diagrams or pictures in this section and remember to include the appropriate in-text citations for the source (append to the figure caption).

4. A section in which you present 5 or morebest practice recommendations for building security (the confidentiality, integrity, availability, authenticity, and non-repudiation for Mobile Applications) into mobile applications used to deliver government information and services. Present these strategies as recommendations for reducing risk.

5. A separate section in which you summarize your research and recommendations.

Attachment:- Cybersecurity in Government Organizations.rar

Reference no: EM132545559

Questions Cloud

Analyze the preceding transactions in terms of the effects : Prepare the income statement, statement of owner's equity, balance sheet. Name the three financial statements. Provide a short description of the role.
Anti-discrimination law : Give five (5) reasons why it is important to follow anti-discrimination law and provide equal opportunity, giving a short explanation of each.
What is the adjusting entry at December : The December 31, 2011 balance sheet of Sauron Company had Accounts Receivable of $400,00. What is the adjusting entry at December
Organisational behaviour make chloe a better manager : How will study of Organisational Behaviour make Chloe a better manager?
Strategy for reducing risk : Write a five to seven page report in which you summarize your research and present your best practices based strategy for reducing risk
Calculate the allowance for doubtful accounts : Todd Company estimates that 3% of net credit sales will become uncollectible. After adjustment at December 31, the allowance for doubtful accounts
Research the best strategies for dealing : Research the best strategies for dealing with distractions and select five of the best and present. Include references
Prepare of financial statements for internet consulting inc : Prepare of the financial statements for Internet Consulting Inc. (Hint: Prepare Income Statement, Statement of Owner's equity and Balance Sheet).
Prepare the necessary journal entries for Natasha Company : Prepare the necessary journal entries for the following transactions for Natasha Company. July 25 Natasha Co. received payment on the Khan note

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd