Strategy for reducing risk

Assignment Help Computer Network Security
Reference no: EM132545559 , Length: 6 pages

CSIA360 Cybersecurity in Government Organizations - University of Maryland Global Campus

Project: Government Mobile Apps Security Assessment & Strategy

For this research report you will research and then present your findings about cybersecurity issues specific to mobile applications. You will also provide a set of recommendations for best practices (your "strategy") for security architectures and designs formobile apps.

Mobile applications are important because they allow citizens and other stakeholders to access information and services through the federal government's digital government initiatives. For more information about requirements to provide mobile friendly websites and mobile apps see this blog posting from GSA.GOV

Research:

1. Review the Weekly readings.

2. Review recent changes in US Laws regarding the requirement for mobile friendly government websites.

3. Research the "best" of federal mobile apps to see examples of the type of apps that other agencies have created in the past.
a. 19 of the Coolest Government Mobile
b. 10 Most Entertaining Government Mobile Apps
c. The Best Government Mobile Apps for Business...and Your Office
d. 3 Innovative Ways Agencies are Leveraging Mobile Apps

4. Research the federal government's perspective on mobile app security architectures and design recommendations. Here are three sources to help you get started:
a. App Developers: Start with Security
b. Mobile Security Reference Architecture
c. How to build a secure mobile app: 10 tips

5. Research industry recommendations for mobile app security. Begin with the following sources:
a. OWASP Mobile Security
b. Top 10 Mobile Risks(click on tab)
c. Mobile app security: Always keep the back door

6. Find five or more best practice recommendations for ensuring the security of mobile apps. These recommendations must include security for the platform (mobile device), the data on the device, and the transmission path between the device and the mobile application server. Your focus should be upon recommendations that can be implemented as part of a strategy for reducing risk.
Write:

Write a five to sevenpage report in which you summarize your research and present your "best practices" based strategy for reducing risk and ensuring security for government provided mobile apps and their users. You should focus upon clarity and conciseness more than length when determining what content to include in your paper. At a minimum, your report must include the following:

1. An introduction or overview of mobile apps for digital government.Include 5 or more examples of mobile apps recognized as being innovative or "best of category" applications for delivering government information and services to mobile devices.This introduction should be suitable for an executive audience.

2. A separate section in which you discuss the federal government's requirements and recommendations for mobile app security architectures and the associated design recommendations. Write this section for non-technical managers; you will need to translate from tech-speak to manager-speak. Include at least three diagrams or pictures in this section and remember to include the appropriate in-text citations for the source (append to the figure caption).

3. A separate section in which you discuss industry's recommendations for security architectures and risk reduction for mobile app security. Write this section for non-technical managers; you will need to translate from tech-speak to manager-speak. Include at least three diagrams or pictures in this section and remember to include the appropriate in-text citations for the source (append to the figure caption).

4. A section in which you present 5 or morebest practice recommendations for building security (the confidentiality, integrity, availability, authenticity, and non-repudiation for Mobile Applications) into mobile applications used to deliver government information and services. Present these strategies as recommendations for reducing risk.

5. A separate section in which you summarize your research and recommendations.

Attachment:- Cybersecurity in Government Organizations.rar

Reference no: EM132545559

Questions Cloud

Analyze the preceding transactions in terms of the effects : Prepare the income statement, statement of owner's equity, balance sheet. Name the three financial statements. Provide a short description of the role.
Anti-discrimination law : Give five (5) reasons why it is important to follow anti-discrimination law and provide equal opportunity, giving a short explanation of each.
What is the adjusting entry at December : The December 31, 2011 balance sheet of Sauron Company had Accounts Receivable of $400,00. What is the adjusting entry at December
Organisational behaviour make chloe a better manager : How will study of Organisational Behaviour make Chloe a better manager?
Strategy for reducing risk : Write a five to seven page report in which you summarize your research and present your best practices based strategy for reducing risk
Calculate the allowance for doubtful accounts : Todd Company estimates that 3% of net credit sales will become uncollectible. After adjustment at December 31, the allowance for doubtful accounts
Research the best strategies for dealing : Research the best strategies for dealing with distractions and select five of the best and present. Include references
Prepare of financial statements for internet consulting inc : Prepare of the financial statements for Internet Consulting Inc. (Hint: Prepare Income Statement, Statement of Owner's equity and Balance Sheet).
Prepare the necessary journal entries for Natasha Company : Prepare the necessary journal entries for the following transactions for Natasha Company. July 25 Natasha Co. received payment on the Khan note

Reviews

Write a Review

Computer Network Security Questions & Answers

  Difference between a rainbow table and a hash lookup table

Explain the difference between a rainbow table and a hash lookup table in respect to trying to compromise a computer system's password? What is reduction function, what does it do, and what is its purpose?

  Determine whether x is even or odd

It can be shown that 5 is a primitive root for the prime 1223. You want to solve the discrete logarithm problem 5^x = 3 (mod 1223). Given that 3^611 = 1 (mod 1223), determine whether x is even or odd. Follow the below step for correct answers.

  Define physical secuirty and three types of threats

Define Physical secuirty and three types of threats related with physical security. Write down the steps in designing and choosing a secure site in detail.

  Identify hardware and software needed to secure network

Identify hardware and software needed to secure your choice of networks against all electronic threats. Distinguish between local area networks (LANs), wide area networks (WANs), and wireless technologies

  Discuss about the public-key cryptography

Discuss about the Public-Key Cryptography ,RSA Cryptosystem,Elliptic Curve Cryptosystems,Message Authentication Codes etc.

  Analyze the network diagram for pureland wastewater

This assignment requires you to analyze the network diagram for PureLand Wastewater and make specific recommendations to improve network security.

  How clark -wilson model is implemented on computer system

Assume that the Clark -Wilson model is implemented on a computer system. Could a computer virus that scrambled constrained data items be introduced into the system?

  What is the vigenere cipher and how does it work

Create a Vigenère cipher of your own and see who can crack it! Toward the end of the week, provide the solution to your cipher.

  Issues in relation to cyberbullying

What are the strategies to tackle issues in relation to cyberbullying - How would you educate organisations and individuals to protect themselves

  Prepare malicious network activity report

Consortium of Banks represented by the Financial Services Information Sharing and Analysis Center - Who breached the networks and what happened to the extracted

  Define intellectual property in cyberspace

Develop a one-page poster in Word or PowerPoint for a public service campaign to educate people about intellectual property rights of cyberspace for some aspect in your readings from this week.

  Increment value in one cell in excel

Discuss how to increment value in one cell in Excel if another cell is populated. or example, I have cell A that has values such as 1, 2, 3, 4 etc...

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd