Weitere Àhnliche Inhalte
Ăhnlich wie Project 3:Government Mobile Apps Security Assessment & Strategy (20)
KĂŒrzlich hochgeladen (20)
Project 3:Government Mobile Apps Security Assessment & Strategy
- 1. CSIA 360: Cybersecurity in Government Organizations
Copyright ©2019 by University of Maryland University College. All Rights Reserved
Open this link for Solution
https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security-
Assessment--Strategy---2019
Project 3:Government Mobile Apps Security Assessment & Strategy
For thisresearchreportyouwill researchandthenpresentyourfindingsaboutcybersecurity
issuesspecifictomobile applications.Youwill alsoprovide asetof recommendationsforbestpractices
(yourâstrategyâ) forsecurityarchitecturesanddesignsformobile apps.
Mobile applicationsare importantbecause theyallowcitizensandotherstakeholderstoaccess
informationandservicesthroughthe federal governmentâsdigitalgovernmentinitiatives.Formore
informationaboutrequirementstoprovide mobilefriendlywebsitesandmobile appssee thisblog
postingfromCIO.GOV https://www.cio.gov/2018/08/13/design-accessibility.htmlandthe textof the
ConnectedGovernmentActPublicLaw115-114 https://www.congress.gov/115/plaws/publ114/PLAW-
115publ114.pdf
Note:thisassignmentrequiresinclusionof diagramsorgraphicswhichhelptoexplainthe
informationprovidedinyouranalysisandstrategy.Youare notrequiredtocreate these onyour own.
Instead,youshouldlookforuseful graphics/diagramsinthe readingsanduse those tosupportyour
work.You mustcite the source foreach piece of artworkusedinyour project.Puta figure captionunder
the diagramor chart and then place the in-textcitationatthe endof the caption.See the example atthe
endof thisfile.
Research:
1. Reviewthe Weeklyreadings.
2. ReviewrecentchangesinUSLaws regardingthe requirementformobilefriendlygovernment
websites.
a. https://www.congress.gov/115/plaws/publ114/PLAW-115publ114.pdf
b. https://www.nextgov.com/ideas/2018/01/what-digital-government-cx-pros-should-
know-about-connected-government-act/144987/
c. https://www.fedscoop.com/bill-mobile-friendly-government-websites-cruises-senate/
3. Researchthe âbestâof federal mobile appstosee examplesof the type of appsthatother agencies
have createdinthe past.
a. 19 of theCoolestGovernmentMobile
Appshttps://www.govloop.com/community/blog/cool-gov-mobile-apps/
b. 10 MostEntertaining GovernmentMobileApps
https://www.govloop.com/community/blog/10-most-entertaining-government-mobile-
apps/
c. 3 Innovative WaysAgenciesare LeveragingMobile Apps http://fedscoop.com/great-
government-mobile-apps
- 2. CSIA 360: Cybersecurity in Government Organizations
Copyright ©2019 by University of Maryland University College. All Rights Reserved
4. Researchthe federal governmentâsperspective onmobileappsecurityarchitecturesanddesign
recommendations.Here are three sourcestohelpyougetstarted:
a. App Developers:Startwith Security
https://www.ftc.gov/tips-advice/business-center/guidance/app-developers-start-
security
b. Mobile SecurityReference Architecture
https://s3.amazonaws.com/sitesusa/wp-
content/uploads/sites/1151/downloads/2013/05/Mobile-Security-Reference-
Architecture.pdf
c. Howto build a secure mobileapp:10 tips
https://www.techrepublic.com/article/how-to-build-a-secure-mobile-app-10-tips/
5. Researchindustryrecommendationsformobileappsecurity.Beginwiththe followingsources:
a. OWASPMobileSecurity
Projecthttps://www.owasp.org/index.php/OWASP_Mobile_Security_Project
b. Top 10 MobileRisks(clickontab)
https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mo
bile_Risks
c. Mobile app security:Alwayskeep the backdoor
lockedhttp://arstechnica.com/security/2013/02/mobile-app-security-always-keep-the-
back-door-locked/
6. Findfive ormore bestpractice recommendationsforensuringthe securityof mobile apps.These
recommendationsmustincludesecurityforthe platform(mobile device),the dataonthe device,
and the transmissionpathbetweenthe device andthe mobile applicationserver.Yourfocusshould
be upon recommendationswhichcanbe implementedaspartof a strategyforreducingrisk.
Write:
Write a five tosevenpage reportinwhichyousummarize yourresearchandpresentyourâbest
practicesâbasedstrategyforreducingriskand ensuringsecurityforgovernmentprovidedmobile apps
and theirusers.Youshouldfocusuponclarityandconcisenessmore than lengthwhendetermining
whatcontentto include inyourpaper.Ata minimum, yourreportmustinclude the following:
1. An introductionoroverview of mobileappsfordigital government.Youroverview shouldinclude
discussionof the Connected GovernmentAct,examplesof mobile appswhichare recognizedas
beinginnovative,andâbestof categoryâapplicationsfordeliveringgovernmentinformationand
servicestomobile devices.Thisintroductionshouldbe suitableforanexecutiveaudience.
2. A separate sectioninwhichyoudiscussthe federal governmentâsrequirementsand
recommendationsformobile appsecurityarchitecturesandthe associateddesign
recommendations.Thissectionshouldbe writtenfornon-technical managers;youwill needto
translate fromtech-speaktomanager-speak.Diagramsandpicturesmaybe useful but,remember
to include the appropriate in-textcitationsforthe source (appendtothe figure caption).
- 3. CSIA 360: Cybersecurity in Government Organizations
Copyright ©2019 by University of Maryland University College. All Rights Reserved
3. A separate sectioninwhichyoudiscussindustryâsrecommendationsforsecurityarchitecturesand
riskreductionformobile appsecurity.
4. A sectioninwhichyoupresent5 or morebestpracticerecommendationsforbuildingsecurityinto
mobile applicationsusedtodelivergovernmentinformationandservices.These recommendations
shouldbe presentedasastrategyfor reducingrisk.
5. A separate sectioninwhichyousummarize yourresearchandrecommendations.
SubmitFor Grading
Submityourworkin MS Word format (.docx or.doc file) usingthe Project3Assignmentinyour
assignmentfolder.(Attachthe file.)
Additional Information
1. Consultthe gradingrubricfor specificcontentandformattingrequirementsforthisassignment.
2. Your 5 to 7 page researchreportshouldbe professionalinappearance withconsistentuse of
fonts,fontsizes,margins,etc.Youshoulduse headingsandpage breakstoorganize yourpaper.
3. Your papershoulduse standardtermsand definitionsforcybersecurity.
4. The CSIA programrecommendsthatyoufollow standardAPA formattingsince thiswill give you
a documentthat meetsthe âprofessional appearanceârequirements.APA formattingguidelines
and examplesare foundunderCourse Resources>APA Resources.AnAPA template file (MS
Word format) hasalso beenprovidedforyouruse
CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx.
5. You mustinclude acover page withthe assignmenttitle,yourname,andthe due date.Your
reference listmustbe ona separate page at the endof your file.These pagesdonotcount
towardsthe assignmentâspage count.
6. You are expectedtowrite grammaticallycorrectEnglishineveryassignmentthatyousubmitfor
grading.Do not turnin anywork without(a) usingspell check,(b) usinggrammarcheck,(c)
verifyingthatyourpunctuationiscorrectand(d) reviewingyourworkforcorrectword usage
and correctlystructuredsentencesandparagraphs.
7. Credityoursourcesusingin-textcitationsandreference listentries.Bothyourcitationsandyour
reference listentriesmustfollow aconsistentcitationstyle(APA,MLA,etc.).
Example Diagram with Citation and Reference ListEntry
- 4. CSIA 360: Cybersecurity in Government Organizations
Copyright ©2019 by University of Maryland University College. All Rights Reserved
Figure 1. Enterprise Core Services (Adapted from Figure 1 in CIO Council, 2013, p. 5)
Federal CIOCouncil &Departmentof HomelandSecurity.(2013). Mobilesecurity referencearchitecture.
Retrievedfrom https://s3.amazonaws.com/sitesusa/wp-content/uploads/sites/1151/
downloads/2013/05/Mobile-Security-Reference-Architecture.pdf
Open this link for Solution
https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security-
Assessment--Strategy---2019
Open this link for Solution
https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security-
Assessment--Strategy---2019
Open this link for Solution
https://www.coursemerit.com/solution-details/42349/Project-3-Government-Mobile-Apps-Security-
Assessment--Strategy---2019