Government Mobile Apps Security Assessment

Assignment Help Computer Network Security
Reference no: EM132656651

CSIA360 Cybersecurity in Government Organizations - University of Maryland Global Campus

Project: Government Mobile Apps Security Assessment & Strategy

For this research report you will research and then present your findings about cybersecurity issues specific to mobile applications. You will also provide a set of recommendations for best practices (your "strategy") for security architectures and designs formobile apps.

Mobile applications are important because they allow citizens and other stakeholders to access information and services through the federal government's digital government initiatives. For more information about requirements to provide mobile friendly websites and mobile apps see this blog posting and the text of the Connected Government Act Public Law.

Note: this assignment requires inclusion of diagrams or graphics that help to explain the information provided in your analysis and strategy. You are not required to create these on your own. Instead, you should look for useful graphics/diagrams in the readings and use those to support your work. You must cite the source for each piece of artwork used in your project. Put a figure caption under the diagram or chart and then place the in-text citation at the end of the caption. See the example at the end of this file.

Research:

1. Review the Weekly readings.

2. Review recent changes in US Laws regarding the requirement for mobile friendly government websites.

3. Research the "best" of federal mobile apps to see examples of the type of apps that other agencies have created in the past.
a. 19 of the Coolest Government Mobile Apps
b. 10 Most Entertaining Government Mobile Apps
c. The Best Government Mobile Apps for Business...and Your Office
d. 3 Innovative Ways Agencies are Leveraging Mobile Apps
4. Research the federal government's perspective on mobile app security architectures and design recommendations. Here are three sources to help you get started:
a. App Developers: Start with Security
b. Mobile Security Reference Architecture
c. How to build a secure mobile app: 10 tips
d. 2019 Mobile Security R&D Program Guide
5. Research industry recommendations for mobile app security. Begin with the following sources:
a. OWASP Mobile Security Project
b. Top 10 Mobile Risks(click on tab)
c. Mobile app security: Always keep the back door locked
6. Find five or more best practice recommendations for ensuring the security of mobile apps. These recommendations must include security for the platform (mobile device), the data on the device, and the transmission path between the device and the mobile application server. Your focus should be upon recommendations that can be implemented as part of a strategy for reducing risk.
Write:
Write a five to sevenpagereport in which you summarize your research and present your "best practices" based strategy for reducing risk and ensuring security forgovernment provided mobile apps and their users. You should focus upon clarity and conciseness more than length when determining what content to include in your paper. At a minimum, your report must include the following:

1. An introduction or overview of mobile apps for digital government.Include 5 or more examples of mobile apps recognized as being innovative or "best of category" applications for delivering government information and services to mobile devices.This introduction should be suitable for an executive audience.

2. A separate section in which you discuss the federal government's requirements and recommendations for mobile app security architectures and the associated design recommendations. Write this section for non-technical managers; you will need to translate from tech-speak to manager-speak. Include at least three diagrams or pictures in this section and remember to include the appropriate in-text citations for the source (append to the figure caption).

3. A separate section in which you discuss industry's recommendations for security architectures and risk reduction for mobile app security. Write this section for non-technical managers; you will need to translate from tech-speak to manager-speak. Include at least three diagrams or pictures in this section and remember to include the appropriate in-text citations for the source (append to the figure caption).

4. A section in which you present 5 or morebest practice recommendations for building security (the confidentiality, integrity, availability, authenticity, and non-repudiation for Mobile Applications) into mobile applications used to deliver government information and services. Present these strategies as recommendations for reducing risk.

5. A separate section in which you summarize your research and recommendations.

Attachment:- Government Mobile Apps Security Assessment & Strategy.rar

Reference no: EM132656651

Questions Cloud

Compute the annual after-tax cost of each option : Trent's income tax rate is 21 percent. Compute the annual after-tax cost of each option and indicate which minimizes the after-tax cost of obtaining the worker
Practical advice about preparing for interviews : Summarize the information and add your thoughts to what the experts say. Be sure to also include your own interview preparation experiences.
Compare methodologies in the formation of a partnership : When two or more individuals come together to form a partnership, compare these methodologies in the formation of a partnership. Feel free to use examples
Organization network using untrusted WANs : Discuss the risks associated with allowing remote users to access the Organization's network using untrusted WANs.
Government Mobile Apps Security Assessment : Government Mobile Apps Security Assessment & Strategy - present your findings about cybersecurity issues specific to mobile applications. You will also provide
Define internal and external environments : Define internal and external environments. How do they relate back to the various theories you have seen?
Compute whispering diluted earnings per share : The preferred stock pays an annual dividend of $5 per share. Whispering's tax rate is 30%. Compute Whispering diluted earnings per share
How behaviors and values were shaped by the five agent : How your behaviors, beliefs, values were shaped by the 5 agents of socialization family. Socialization has 2 main purposes - pass on the culture and development
Organize-implement and maintain IT security policies : Describe how to design, organize, implement, and maintain IT security policies.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Find the automorphism group of the repetition code

Find the automorphism group of the repetition code - How much can be said about the algebraic structure and show that the first character in the received message is most likely error-free.

  Find the flag that will also display data-link headers

Enterprise Application Security - you will have to download and install a well known security (software) tool -Snort - on your own computer

  Issues involved in the information systems security

Information Systems Security - ARUMSC2IIS Critically evaluate concepts, principals and practice in the area of information systems security - Demonstrate an in-depth understanding of a comprehensive risk management practice for ensuring secure inform..

  Abc institute of research has sensitive information that

abc institute of research has sensitive information that needs to be protected from its rivals. the institute has

  Case study - guest satisfaction and loyalty

Analyse the attached case study on "Guest Satisfaction and Loyalty with Great Wi-Fi for Luxury Hotel in Greece", to complete the assignment.

  What are the advantages of using dynamic dynamic ip address

COM309: What are the advantages and disadvantages of using dynamic IP address assignments? Find the least-cost route from Node A to all other nodes.

  Discuss the current it cybersecurity policy

Discuss the current (as per the case study) IT cybersecurity policy. Describe the functionality of the new technology selected for implementation and the challenges associated with the current cybersecurity policy.

  Improvement and risk mitigation strategies associated to fdl

Purpose of this risk assessment report is to basically identify and outline all threats, weaknesses and vulnerabilities in regards to Fiji Directories Limited

  Comprehensive analysis of the business needs

Identify network security measures needed and providing detailed information about them. Network security measures should also include preventative and maintenance measures.

  Impair an organizations information security

Compare and contrast a minimum of five potential threats and evaluate how these threats may impair an organization's information security.

  Discuss some of the problems nats create for ipsec security.

Why deployment of IPv6 has been slow to date

  What is the present value of the 360 rental payments

Assuming the annually compounded interest rate is 12% /year, what is the present value of the 360 rental payments.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd