Vulnerability in the marketplace of downloaded applications

Assignment Help Other Engineering
Reference no: EM13858825 , Length:

Please will you be able to assist me with Information Security engineering.

There two discussion questions, each answer to the discussion question must have at least three references using Harvard referencing style.

Q1:  Near field communication (NFC) promises a contactless transfer of your money or information by your mobile phone equipped with a small NFC chip to move important data from A to B: person-to-person, institution-to-institution. For this Discussion, you will research the topic of NFC for answers regarding its validity as a secure system of data transfer.

To complete this Discussion:

Post: Summarise your findings from your research of NFC. Consider the possible simple communication configurations between two devices A and B, and identify possible applications for NFC for each configuration. After researching the possibility of MitM attacks, analyse other possible security attacks for NFC and how to protect against such attacks.

Q2: Vulnerability in the marketplace of downloaded applications (Focused Discussion)

Productivity and sales of downloadable applications online are central to today's online economy and culture. The broad accessibility of these applications and the spontaneity of purchase support the creation and development of these applications and services which enrich everyday lives. Still, the most accessible and trusted online sites and devices can be vulnerable to breaches of security and scams.

In 2014, Google identified a scam antivirus application on its Google Play store. The scam application duped fooled 10,000 users before Google became aware and took action (Zorabedian, 2014). For this Discussion, you will review and scrutinise your own interaction with, purchase of and use of applications from online stores. What are your personal and professional experiences and concerns? Do you see any subtle or obvious structural problems?

Reference:

Zorabedian, J. (2014) Google takes down fake anti-virus app that duped 10,000 users on Play Store [Online]. Available from: https://nakedsecurity.sophos.com/2014/04/09/google-takes-down-fake-anti-virus-app-that-duped-10000-users-on-play-store/ (Accessed: 16 May 2014).

To complete this Discussion:

Post: Identify a specific smartphone application from one of your own devices or a device with which you are familiar. Analyse potential security problems (including privacy concerns) and any solutions for those problems you use or could use. List your general suggestions for users when searching for mobile applications from online stores (e.g. Google Play or Apple App Store).

Verified Expert

Reference no: EM13858825

Questions Cloud

Conclusion of using the generational accounting measure : Which of the following is a conclusion of using the generational accounting measure?
Write up a short description of sox section 806 overview : Write up a short description of a topic in a Word document that you think you can write a 6-10 page paper on SOX - Section 806 Overview.
How could you turn a negative product launch : What would happen if you had a small tablet start-up business and you only had one person on call for service issues? How could you turn a negative product launch into a positive experience using social media? Any ideas
Discussion on the death of ivan ilych : Start a discussion with an observation, comment, or question on The Death of Ivan Ilych, the other reading assignments, or themes in literary fiction.
Vulnerability in the marketplace of downloaded applications : Summarise your findings from your research of NFC. Consider the possible simple communication configurations between two devices A and B, and identify possible applications for NFC for each configuration.
Different stage of the product life cycle : Choose two products; each one should currently be in a different stage of the product life cycle. (Explain why you think each product is in the particular stage)
Calculate the balance delay and balance loss : A Mode1.1 Wagon is to be assembled on a conveyor belt. 500 wagons are required per day. Production time per day is 435 minutes. The assembly steps and times for the wagon are given in the Table. Uptime for the line is expected to be 98% and reposi..
Are you naturally disorganized or a neat freak : Do you agree or disagree? In answering this question, you may want to describe your own organizational habits, and those of people you know. Specific details will probably make your essay more interesting and your argument more persuasive
Prepare a trial balance and calculate the total of debits : The accounts in the ledger of Mickeys Park Co. are listed in alphabetical order. All accounts have normal balances. Prepare a trial balance and calculate The total of the debits.

Reviews

Write a Review

Other Engineering Questions & Answers

  Functions of the decision variables

Define you decision variables, and express your objectives and constraints as functions of the decision variables, and combine everything.

  How to build a earthquake proof building

How to build a earthquake proof building

  Write procedures to manipulate queues

Write a procedure (make-queue) that produces independent first-in-first-out queue objects, using a message-passing style.

  Present a research paper on the topic - reservoir

present a research paper on the topic - reservoir characterisationgive preferences that will provides students with a

  Justify a need for digital forensics methodology

Justify a need for digital forensics methodology and consider scope of the case including nature of alleged misconduct leading to consideration of how electronic and digital evidence may support the investigation.

  Environmental policy literature review implications topic

topic quothow is the problem of ghg emissions represented in victorian transport policyquot ltbrgt ltbrgtwords1500

  What the advantages of digital signals over analog signals

What are the advantages of digital signals over analog signals? Cover noise suppression in your explanation

  The implementation of an integrated is solution

Design a risk matrix to show the likelihood and the impacts of the risks of the failures of the critical IS What is the role of Business Process Re-engineering in the implementation of an integrated IS solution

  Describe a tunnel-boring machine in detail

Describe a tunnel-boring machine in detail and cite examples of their use. Particular emphasis should be placed on the cycle of operations for such a machine.

  Power electronics involves the use of semiconductor devices

power electronics involves the use of semiconductor devices to control a range of applications in rectification dc and

  Heat treatment of high tensile carbon steel

Explain why tempering cycle is essentially required in the heat treatment of high tensile carbon steel and what are the consequences if tempering cycle is not carried out?

  Write a formal proposal with graphs or chart

Write a formal proposal with graphs or chart on ways a trucking company can decrease their carbon footprint by 25%.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd