Provide an overview of what the app is

Assignment Help Management Information Sys
Reference no: EM131703990

Assignment : Security Analysis of an App

The goal of this report is to analyze the permissions of a specific app that is available to public via official app markets from the information security perspective. For this assignment, select an app.

Your app should not be already selected by any other student. A list of the apps that are already selected is available in Blackboard in the same location as the assignment instructions. Once selected, confirm your selected app with the course instructor so that it would be added to the list of the selected apps.

For your selected app, please discuss the following:

• Provide an overview of what the app is/does.

• List the permissions that the app requires (e.g. access to camera, contacts, etc.)

• For each of those permissions explain whether that permission is necessary for proper functioning of the app and why.

• For each permission discuss the potential cyber security issues that can arise due to that permission if the app is compromised.

• As a cybersecurity analyst, discuss what would be the minimum permissions for the app to be able to function properly without having unnecessary permissions/access privileges.

• Review the EULA (End User License Agreement) of the application and answer the following questions.

o Please provide a summary of EULA. Highlight the key/interesting findings.

o If you were the app provider, what changes would you make to the EULA?

o As a potential user of the app, what changes would you make to the EULA?

• Assume that you are a cybersecurity analyst in an organization and are devising the BYOD policy of the organization. What are the potential security issues associated with employees' use of the app on the organization's computing devices or through the organization's network? Please explain.

• As an organization's cybersecurity analyst, would you recommend allowing or prohibiting the use of the app on the organization's devices? Please explain why.

• As an organization's cybersecurity analyst, what actions would you recommend to prevent the potential threats associated with the selected app?

In your report, please reference any security incidents related to the app that has already occurred (if there has been any).

Please keep in mind that the goal of the assignment is not simply describing an instance of security incident but it is analyzing the potential security issues that can arise from the permissions granted to an app.

Format Information: Please adhere to the following format guidelines in preparing your report.

1. The report is to have a cover sheet that identifies:

a. the author's name

b. the title of the report

c. the semester and year during which the paper was submitted

2. The length of papers should range from 700 to 1,000 words (excluding references).

3. Use single space, 12-point font size and allow approximately one-inch margins

4. Include a references section

5. Incorporate APA style for references and citations (in the essay)

Reference no: EM131703990

Questions Cloud

What is meant by the term person-job fit : What is meant by the term "person-job fit". If there isn't a good person-job fit, what are some ways to resolve the situation
How much is the bond worth : This looks good so far but if he requires a YTM of 7.6% how much is the bond worth to him? Would you recommend he purchase it?
Basics of business and corporate strategy : What are the basics of business and corporate strategy? And what are some of the potential benefits or harms to an organization?
What makes the officer love the crime prevention work : What you learned from the interview. What makes the officer love the crime prevention work? What the officer have leant from the mistakes in crime prevention?
Provide an overview of what the app is : For each permission discuss the potential cyber security issues that can arise due to that permission if the app is compromised.
Important aspects of a tqm methodology : In your response to student postings pose a question that probes their logic and asks a critical question.
Do you agree with the statement : Internet is believed to boost the efficiency and effectiveness of any business.
Discuss the hundred years war : Discuss the Hundred Years War: What were its causes. Why did the war continue for so long a period. What advantages did each side possess
Unlocking the future of fuel : What would be a pro and a con of the strategy put forth in the article, "Unlocking the Future of Fuel: Turning Variable Costs into Fixed Costs."

Reviews

Write a Review

Management Information Sys Questions & Answers

  Supply chain management-hi i need help with this question i

supply chain management-hi i need help with this question i need about a page to asnwer this thanks a company has two

  Ethical issues in information systems

Identify two to three human and technological protective measures that you would use as security safeguards and enforcement actions in order to address the ethics issue that you have chosen.

  Information system and processingdevelop the information

information system and processingdevelop the information system business plan for a consulting company for the

  Stock analysis use financial accounting information

Detailed Explanation to Accounting information systems - From the perspective of capital markets, in which ways do stock analysis use financial accounting information?

  You have recently been hired to improve the quality of

you have recently been hired to improve the quality of services at a healthcare organization. your supervisor would

  What operational changes would you expect

What operational changes would you expect if your company implemented a new supply chain system ? What barriers to implementation would you see?

  What are the business costs or risks of poof data quality

What are the business costs or risks of poof data quality? Explain information management. Why do organizations still have information deficiency problem?

  Inhibitors to the vision of full interconnectivity

Inhibitors to the vision of full interconnectivity - What might be some of the major inhibitors to the vision of full interconnectivity among everyone on earth?

  Patent for computer supported business processes

Patent for computer supported business processes - Discusse whether patent office should grant patent for computer-supported business processes.

  Business the old-fashioned way

Does this mean the end of 'doing business the old-fashioned way'? Will this put a burden on the elderly or poor when corporations begin charging for face-to-face services?

  What could have made the article better

Write a summary of the article. Include the purpose for the article, how research was conducted (if any), the results, and other pertinent information. How does the article relate to what you are learning in this course?Discuss the meaning or impl..

  How has technology impacted verbal and nonverbal cues used

How has technology impacted the verbal and nonverbal cues used in interpreting messages? Provide examples to support your position. Use at least one resource to support your key points.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd