SlideShare ist ein Scribd-Unternehmen logo
1 von 4
CSIA 360: Cybersecurity in Government Organizations
Copyright ©2019 by University of Maryland University College. All Rights Reserved
Open this link for Solution
https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security-
Assessment--Strategy---2019
Project 3:Government Mobile Apps Security Assessment & Strategy
For thisresearchreportyouwill researchandthenpresentyourfindingsaboutcybersecurity
issuesspecifictomobile applications.Youwill alsoprovide asetof recommendationsforbestpractices
(your“strategy”) forsecurityarchitecturesanddesignsformobile apps.
Mobile applicationsare importantbecause theyallowcitizensandotherstakeholderstoaccess
informationandservicesthroughthe federal government’sdigitalgovernmentinitiatives.Formore
informationaboutrequirementstoprovide mobilefriendlywebsitesandmobile appssee thisblog
postingfromCIO.GOV https://www.cio.gov/2018/08/13/design-accessibility.htmlandthe textof the
ConnectedGovernmentActPublicLaw115-114 https://www.congress.gov/115/plaws/publ114/PLAW-
115publ114.pdf
Note:thisassignmentrequiresinclusionof diagramsorgraphicswhichhelptoexplainthe
informationprovidedinyouranalysisandstrategy.Youare notrequiredtocreate these onyour own.
Instead,youshouldlookforuseful graphics/diagramsinthe readingsanduse those tosupportyour
work.You mustcite the source foreach piece of artworkusedinyour project.Puta figure captionunder
the diagramor chart and then place the in-textcitationatthe endof the caption.See the example atthe
endof thisfile.
Research:
1. Reviewthe Weeklyreadings.
2. ReviewrecentchangesinUSLaws regardingthe requirementformobilefriendlygovernment
websites.
a. https://www.congress.gov/115/plaws/publ114/PLAW-115publ114.pdf
b. https://www.nextgov.com/ideas/2018/01/what-digital-government-cx-pros-should-
know-about-connected-government-act/144987/
c. https://www.fedscoop.com/bill-mobile-friendly-government-websites-cruises-senate/
3. Researchthe “best”of federal mobile appstosee examplesof the type of appsthatother agencies
have createdinthe past.
a. 19 of theCoolestGovernmentMobile
Appshttps://www.govloop.com/community/blog/cool-gov-mobile-apps/
b. 10 MostEntertaining GovernmentMobileApps
https://www.govloop.com/community/blog/10-most-entertaining-government-mobile-
apps/
c. 3 Innovative WaysAgenciesare LeveragingMobile Apps http://fedscoop.com/great-
government-mobile-apps
CSIA 360: Cybersecurity in Government Organizations
Copyright ©2019 by University of Maryland University College. All Rights Reserved
4. Researchthe federal government’sperspective onmobileappsecurityarchitecturesanddesign
recommendations.Here are three sourcestohelpyougetstarted:
a. App Developers:Startwith Security
https://www.ftc.gov/tips-advice/business-center/guidance/app-developers-start-
security
b. Mobile SecurityReference Architecture
https://s3.amazonaws.com/sitesusa/wp-
content/uploads/sites/1151/downloads/2013/05/Mobile-Security-Reference-
Architecture.pdf
c. Howto build a secure mobileapp:10 tips
https://www.techrepublic.com/article/how-to-build-a-secure-mobile-app-10-tips/
5. Researchindustryrecommendationsformobileappsecurity.Beginwiththe followingsources:
a. OWASPMobileSecurity
Projecthttps://www.owasp.org/index.php/OWASP_Mobile_Security_Project
b. Top 10 MobileRisks(clickontab)
https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mo
bile_Risks
c. Mobile app security:Alwayskeep the backdoor
lockedhttp://arstechnica.com/security/2013/02/mobile-app-security-always-keep-the-
back-door-locked/
6. Findfive ormore bestpractice recommendationsforensuringthe securityof mobile apps.These
recommendationsmustincludesecurityforthe platform(mobile device),the dataonthe device,
and the transmissionpathbetweenthe device andthe mobile applicationserver.Yourfocusshould
be upon recommendationswhichcanbe implementedaspartof a strategyforreducingrisk.
Write:
Write a five tosevenpage reportinwhichyousummarize yourresearchandpresentyour“best
practices”basedstrategyforreducingriskand ensuringsecurityforgovernmentprovidedmobile apps
and theirusers.Youshouldfocusuponclarityandconcisenessmore than lengthwhendetermining
whatcontentto include inyourpaper.Ata minimum, yourreportmustinclude the following:
1. An introductionoroverview of mobileappsfordigital government.Youroverview shouldinclude
discussionof the Connected GovernmentAct,examplesof mobile appswhichare recognizedas
beinginnovative,and“bestof category”applicationsfordeliveringgovernmentinformationand
servicestomobile devices.Thisintroductionshouldbe suitableforanexecutiveaudience.
2. A separate sectioninwhichyoudiscussthe federal government’srequirementsand
recommendationsformobile appsecurityarchitecturesandthe associateddesign
recommendations.Thissectionshouldbe writtenfornon-technical managers;youwill needto
translate fromtech-speaktomanager-speak.Diagramsandpicturesmaybe useful but,remember
to include the appropriate in-textcitationsforthe source (appendtothe figure caption).
CSIA 360: Cybersecurity in Government Organizations
Copyright ©2019 by University of Maryland University College. All Rights Reserved
3. A separate sectioninwhichyoudiscussindustry’srecommendationsforsecurityarchitecturesand
riskreductionformobile appsecurity.
4. A sectioninwhichyoupresent5 or morebestpracticerecommendationsforbuildingsecurityinto
mobile applicationsusedtodelivergovernmentinformationandservices.These recommendations
shouldbe presentedasastrategyfor reducingrisk.
5. A separate sectioninwhichyousummarize yourresearchandrecommendations.
SubmitFor Grading
Submityourworkin MS Word format (.docx or.doc file) usingthe Project3Assignmentinyour
assignmentfolder.(Attachthe file.)
Additional Information
1. Consultthe gradingrubricfor specificcontentandformattingrequirementsforthisassignment.
2. Your 5 to 7 page researchreportshouldbe professionalinappearance withconsistentuse of
fonts,fontsizes,margins,etc.Youshoulduse headingsandpage breakstoorganize yourpaper.
3. Your papershoulduse standardtermsand definitionsforcybersecurity.
4. The CSIA programrecommendsthatyoufollow standardAPA formattingsince thiswill give you
a documentthat meetsthe “professional appearance”requirements.APA formattingguidelines
and examplesare foundunderCourse Resources>APA Resources.AnAPA template file (MS
Word format) hasalso beenprovidedforyouruse
CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx.
5. You mustinclude acover page withthe assignmenttitle,yourname,andthe due date.Your
reference listmustbe ona separate page at the endof your file.These pagesdonotcount
towardsthe assignment’spage count.
6. You are expectedtowrite grammaticallycorrectEnglishineveryassignmentthatyousubmitfor
grading.Do not turnin anywork without(a) usingspell check,(b) usinggrammarcheck,(c)
verifyingthatyourpunctuationiscorrectand(d) reviewingyourworkforcorrectword usage
and correctlystructuredsentencesandparagraphs.
7. Credityoursourcesusingin-textcitationsandreference listentries.Bothyourcitationsandyour
reference listentriesmustfollow aconsistentcitationstyle(APA,MLA,etc.).
Example Diagram with Citation and Reference ListEntry
CSIA 360: Cybersecurity in Government Organizations
Copyright ©2019 by University of Maryland University College. All Rights Reserved
Figure 1. Enterprise Core Services (Adapted from Figure 1 in CIO Council, 2013, p. 5)
Federal CIOCouncil &Departmentof HomelandSecurity.(2013). Mobilesecurity referencearchitecture.
Retrievedfrom https://s3.amazonaws.com/sitesusa/wp-content/uploads/sites/1151/
downloads/2013/05/Mobile-Security-Reference-Architecture.pdf
Open this link for Solution
https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security-
Assessment--Strategy---2019
Open this link for Solution
https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security-
Assessment--Strategy---2019
Open this link for Solution
https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security-
Assessment--Strategy---2019

Weitere Àhnliche Inhalte

Was ist angesagt?

Gartner Market Insights- Mobile Threat Defense and EMM
Gartner Market Insights- Mobile Threat Defense and EMMGartner Market Insights- Mobile Threat Defense and EMM
Gartner Market Insights- Mobile Threat Defense and EMM
Youssef Afzali
 

Was ist angesagt? (20)

Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
 
Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...
Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...
Intelligent Virtual Assistant Market PPT: Overview, Dynamics, Trends, Segment...
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
Top 10 Mobile Application Development Trends In 2016
Top 10 Mobile Application Development Trends In 2016Top 10 Mobile Application Development Trends In 2016
Top 10 Mobile Application Development Trends In 2016
 
Enterprise endpoint security_market
Enterprise endpoint security_marketEnterprise endpoint security_market
Enterprise endpoint security_market
 
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataApp Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing Data
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...
Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...
Iris Recognition Market PPT: Trends and Dynamics, Drivers, Competitive landsc...
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
 
Unisys Security Insights Infographic: Global
Unisys Security Insights Infographic: GlobalUnisys Security Insights Infographic: Global
Unisys Security Insights Infographic: Global
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape
 
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivSentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel Aviv
 
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...
 
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
 
Cloud computing market
Cloud computing marketCloud computing market
Cloud computing market
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
 
Mobile app industry
Mobile app industryMobile app industry
Mobile app industry
 
Digital Generation: Security Infographic
Digital Generation: Security InfographicDigital Generation: Security Infographic
Digital Generation: Security Infographic
 
Gartner Market Insights- Mobile Threat Defense and EMM
Gartner Market Insights- Mobile Threat Defense and EMMGartner Market Insights- Mobile Threat Defense and EMM
Gartner Market Insights- Mobile Threat Defense and EMM
 
The Internet of Things: Opportunity for Insurers
The Internet of Things: Opportunity for InsurersThe Internet of Things: Opportunity for Insurers
The Internet of Things: Opportunity for Insurers
 

Ähnlich wie Project 3:Government Mobile Apps Security Assessment & Strategy

Samsung_FCW GameChanger
Samsung_FCW GameChangerSamsung_FCW GameChanger
Samsung_FCW GameChanger
Johnny Overcast
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
sciccone
 

Ähnlich wie Project 3:Government Mobile Apps Security Assessment & Strategy (20)

Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology Innovations
 
F5 State of App Strategy Report 2023.pdf
F5 State of App Strategy Report 2023.pdfF5 State of App Strategy Report 2023.pdf
F5 State of App Strategy Report 2023.pdf
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
 
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
9 Hidden Challenges of Enterprise Mobility Application Development by Utah Te...
 
Samsung_FCW GameChanger
Samsung_FCW GameChangerSamsung_FCW GameChanger
Samsung_FCW GameChanger
 
The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019
 
Mobile App Development
Mobile App DevelopmentMobile App Development
Mobile App Development
 
Role of Mobility in Workplace Transformation
Role of Mobility in Workplace TransformationRole of Mobility in Workplace Transformation
Role of Mobility in Workplace Transformation
 
Mobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security ControlMobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security Control
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
 
Selling Your Organization on Application Security
Selling Your Organization on Application SecuritySelling Your Organization on Application Security
Selling Your Organization on Application Security
 
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Strategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyStrategic Private Cloud - When and Why
Strategic Private Cloud - When and Why
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
IoT services in the automotive sector
IoT services in the automotive sectorIoT services in the automotive sector
IoT services in the automotive sector
 
State Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile ReadinessState Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile Readiness
 
Accelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise MobilityAccelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise Mobility
 

Mehr von Arshad ali (6)

Tax655 final project_guidelines_and_rubric-converted (1)
Tax655 final project_guidelines_and_rubric-converted (1)Tax655 final project_guidelines_and_rubric-converted (1)
Tax655 final project_guidelines_and_rubric-converted (1)
 
Liberty university psyc 210 quiz 1- 9
Liberty university psyc 210 quiz 1- 9Liberty university psyc 210 quiz 1- 9
Liberty university psyc 210 quiz 1- 9
 
Bus520 assignment 1-converted
Bus520 assignment 1-convertedBus520 assignment 1-converted
Bus520 assignment 1-converted
 
Open this link for solution
Open this link for solutionOpen this link for solution
Open this link for solution
 
Solution
SolutionSolution
Solution
 
Criminal profiling
Criminal profilingCriminal profiling
Criminal profiling
 

KĂŒrzlich hochgeladen

Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Dipal Arora
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 

KĂŒrzlich hochgeladen (20)

Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
BAGALUR CALL GIRL IN 98274*61493 ❀CALL GIRLS IN ESCORT SERVICE❀CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❀CALL GIRLS IN ESCORT SERVICE❀CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❀CALL GIRLS IN ESCORT SERVICE❀CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❀CALL GIRLS IN ESCORT SERVICE❀CALL GIRL
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 

Project 3:Government Mobile Apps Security Assessment & Strategy

  • 1. CSIA 360: Cybersecurity in Government Organizations Copyright ©2019 by University of Maryland University College. All Rights Reserved Open this link for Solution https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security- Assessment--Strategy---2019 Project 3:Government Mobile Apps Security Assessment & Strategy For thisresearchreportyouwill researchandthenpresentyourfindingsaboutcybersecurity issuesspecifictomobile applications.Youwill alsoprovide asetof recommendationsforbestpractices (your“strategy”) forsecurityarchitecturesanddesignsformobile apps. Mobile applicationsare importantbecause theyallowcitizensandotherstakeholderstoaccess informationandservicesthroughthe federal government’sdigitalgovernmentinitiatives.Formore informationaboutrequirementstoprovide mobilefriendlywebsitesandmobile appssee thisblog postingfromCIO.GOV https://www.cio.gov/2018/08/13/design-accessibility.htmlandthe textof the ConnectedGovernmentActPublicLaw115-114 https://www.congress.gov/115/plaws/publ114/PLAW- 115publ114.pdf Note:thisassignmentrequiresinclusionof diagramsorgraphicswhichhelptoexplainthe informationprovidedinyouranalysisandstrategy.Youare notrequiredtocreate these onyour own. Instead,youshouldlookforuseful graphics/diagramsinthe readingsanduse those tosupportyour work.You mustcite the source foreach piece of artworkusedinyour project.Puta figure captionunder the diagramor chart and then place the in-textcitationatthe endof the caption.See the example atthe endof thisfile. Research: 1. Reviewthe Weeklyreadings. 2. ReviewrecentchangesinUSLaws regardingthe requirementformobilefriendlygovernment websites. a. https://www.congress.gov/115/plaws/publ114/PLAW-115publ114.pdf b. https://www.nextgov.com/ideas/2018/01/what-digital-government-cx-pros-should- know-about-connected-government-act/144987/ c. https://www.fedscoop.com/bill-mobile-friendly-government-websites-cruises-senate/ 3. Researchthe “best”of federal mobile appstosee examplesof the type of appsthatother agencies have createdinthe past. a. 19 of theCoolestGovernmentMobile Appshttps://www.govloop.com/community/blog/cool-gov-mobile-apps/ b. 10 MostEntertaining GovernmentMobileApps https://www.govloop.com/community/blog/10-most-entertaining-government-mobile- apps/ c. 3 Innovative WaysAgenciesare LeveragingMobile Apps http://fedscoop.com/great- government-mobile-apps
  • 2. CSIA 360: Cybersecurity in Government Organizations Copyright ©2019 by University of Maryland University College. All Rights Reserved 4. Researchthe federal government’sperspective onmobileappsecurityarchitecturesanddesign recommendations.Here are three sourcestohelpyougetstarted: a. App Developers:Startwith Security https://www.ftc.gov/tips-advice/business-center/guidance/app-developers-start- security b. Mobile SecurityReference Architecture https://s3.amazonaws.com/sitesusa/wp- content/uploads/sites/1151/downloads/2013/05/Mobile-Security-Reference- Architecture.pdf c. Howto build a secure mobileapp:10 tips https://www.techrepublic.com/article/how-to-build-a-secure-mobile-app-10-tips/ 5. Researchindustryrecommendationsformobileappsecurity.Beginwiththe followingsources: a. OWASPMobileSecurity Projecthttps://www.owasp.org/index.php/OWASP_Mobile_Security_Project b. Top 10 MobileRisks(clickontab) https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mo bile_Risks c. Mobile app security:Alwayskeep the backdoor lockedhttp://arstechnica.com/security/2013/02/mobile-app-security-always-keep-the- back-door-locked/ 6. Findfive ormore bestpractice recommendationsforensuringthe securityof mobile apps.These recommendationsmustincludesecurityforthe platform(mobile device),the dataonthe device, and the transmissionpathbetweenthe device andthe mobile applicationserver.Yourfocusshould be upon recommendationswhichcanbe implementedaspartof a strategyforreducingrisk. Write: Write a five tosevenpage reportinwhichyousummarize yourresearchandpresentyour“best practices”basedstrategyforreducingriskand ensuringsecurityforgovernmentprovidedmobile apps and theirusers.Youshouldfocusuponclarityandconcisenessmore than lengthwhendetermining whatcontentto include inyourpaper.Ata minimum, yourreportmustinclude the following: 1. An introductionoroverview of mobileappsfordigital government.Youroverview shouldinclude discussionof the Connected GovernmentAct,examplesof mobile appswhichare recognizedas beinginnovative,and“bestof category”applicationsfordeliveringgovernmentinformationand servicestomobile devices.Thisintroductionshouldbe suitableforanexecutiveaudience. 2. A separate sectioninwhichyoudiscussthe federal government’srequirementsand recommendationsformobile appsecurityarchitecturesandthe associateddesign recommendations.Thissectionshouldbe writtenfornon-technical managers;youwill needto translate fromtech-speaktomanager-speak.Diagramsandpicturesmaybe useful but,remember to include the appropriate in-textcitationsforthe source (appendtothe figure caption).
  • 3. CSIA 360: Cybersecurity in Government Organizations Copyright ©2019 by University of Maryland University College. All Rights Reserved 3. A separate sectioninwhichyoudiscussindustry’srecommendationsforsecurityarchitecturesand riskreductionformobile appsecurity. 4. A sectioninwhichyoupresent5 or morebestpracticerecommendationsforbuildingsecurityinto mobile applicationsusedtodelivergovernmentinformationandservices.These recommendations shouldbe presentedasastrategyfor reducingrisk. 5. A separate sectioninwhichyousummarize yourresearchandrecommendations. SubmitFor Grading Submityourworkin MS Word format (.docx or.doc file) usingthe Project3Assignmentinyour assignmentfolder.(Attachthe file.) Additional Information 1. Consultthe gradingrubricfor specificcontentandformattingrequirementsforthisassignment. 2. Your 5 to 7 page researchreportshouldbe professionalinappearance withconsistentuse of fonts,fontsizes,margins,etc.Youshoulduse headingsandpage breakstoorganize yourpaper. 3. Your papershoulduse standardtermsand definitionsforcybersecurity. 4. The CSIA programrecommendsthatyoufollow standardAPA formattingsince thiswill give you a documentthat meetsthe “professional appearance”requirements.APA formattingguidelines and examplesare foundunderCourse Resources>APA Resources.AnAPA template file (MS Word format) hasalso beenprovidedforyouruse CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx. 5. You mustinclude acover page withthe assignmenttitle,yourname,andthe due date.Your reference listmustbe ona separate page at the endof your file.These pagesdonotcount towardsthe assignment’spage count. 6. You are expectedtowrite grammaticallycorrectEnglishineveryassignmentthatyousubmitfor grading.Do not turnin anywork without(a) usingspell check,(b) usinggrammarcheck,(c) verifyingthatyourpunctuationiscorrectand(d) reviewingyourworkforcorrectword usage and correctlystructuredsentencesandparagraphs. 7. Credityoursourcesusingin-textcitationsandreference listentries.Bothyourcitationsandyour reference listentriesmustfollow aconsistentcitationstyle(APA,MLA,etc.). Example Diagram with Citation and Reference ListEntry
  • 4. CSIA 360: Cybersecurity in Government Organizations Copyright ©2019 by University of Maryland University College. All Rights Reserved Figure 1. Enterprise Core Services (Adapted from Figure 1 in CIO Council, 2013, p. 5) Federal CIOCouncil &Departmentof HomelandSecurity.(2013). Mobilesecurity referencearchitecture. Retrievedfrom https://s3.amazonaws.com/sitesusa/wp-content/uploads/sites/1151/ downloads/2013/05/Mobile-Security-Reference-Architecture.pdf Open this link for Solution https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security- Assessment--Strategy---2019 Open this link for Solution https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security- Assessment--Strategy---2019 Open this link for Solution https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security- Assessment--Strategy---2019