Mobile Application Threat Modelling
You are a cyber threat analyst at a mobile applications company. One morning, your supervisor, Dan, tells you about a mobile application security project that is already underway but needs more guidance. Because of your success in previous projects, he wants your help.
Your expertise and oversight will enable the mobile app team to meet its approaching deadline. "Mobile applications and their security are on the technology roadmap for our organization. Of course, this means we need to be well-informed of mobile application security management," Dan says.
"Without the proper threat modeling, leadership can't be sure of the issues that lie ahead. I want you to oversee the project and manage the team," Dan says. "We'd also like you to contribute to this project by preparing a report for senior management. The report should include threat models to this technology as well as remediation for management to consider. The report should give senior management a greater understanding of mobile application security and its implementation.
Your report should consist of the following sections: mobile application architecture, mobile data, threat agent identification, methods of attack, and possible controls. The goal is to convince senior managers that your proposals will benefit the company. If you succeed, leadership will move forward with its plan for mobile applications.
Threat modeling begins with a clear understanding of the system in question. There are several areas to consider when trying to understand possible threats to an application. The areas of concern include the mobile application structure, the data, identifying threat agents and methods of attack, and controls to prevent attacks. The threat model should be created with an outline or checklist of items that need to be documented, reviewed, and discussed when developing a mobile application.
👀 Other Visitors are Viewing These APA Research Paper Samples:
- Joint Network Defense Bulletin: The Financial Services Consortium1 page/≈275 words | 2 Sources | APA | IT & Computer Science | Research Paper |
- Assessing Information System Vulnerabilities RAR5 pages/≈1375 words | 4 Sources | APA | IT & Computer Science | Research Paper |
- Information System Vulnerabilities And Risk In Cybertech - SAR7 pages/≈1925 words | 4 Sources | APA | IT & Computer Science | Research Paper |
- The Impact of big data on software design. Research Paper8 pages/≈2200 words | 5 Sources | APA | IT & Computer Science | Research Paper |
- Provide An Introduction To Digital Forensic Analysis4 pages/≈1100 words | 3 Sources | APA | IT & Computer Science | Research Paper |
- ITM490 Information Technology Management Module 1 Case3 pages/≈825 words | 7 Sources | APA | IT & Computer Science | Research Paper |
- Contemporary Social Issue Paper (Relating to Informatics)7 pages/≈1925 words | 1 Source | APA | IT & Computer Science | Research Paper |