Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Dhs mobile security reference architecture

26/11/2021 Client: muhammad11 Deadline: 2 Day

Government Mobile Apps Security Assessment & Strategy

Project 3: Government Mobile Apps Security Assessment & Strategy

For this research report you will research and then present your findings about cybersecurity issues specific to mobile applications. You will also provide a set of recommendations for best practices (your “strategy”) for security architectures and designs for mobile apps.

Mobile applications are important because they allow citizens and other stakeholders to access information and services through the federal government’s digital government initiatives. For more information about requirements to provide mobile friendly websites and mobile apps see this blog posting from CIO.GOV https://www.cio.gov/2018/08/13/design-accessibility.html and the text of the Connected Government Act Public Law 115-114 https://www.congress.gov/115/plaws/publ114/PLAW-115publ114.pdf

Note: this assignment requires inclusion of diagrams or graphics which help to explain the information provided in your analysis and strategy. You are not required to create these on your own. Instead, you should look for useful graphics / diagrams in the readings and use those to support your work. You must cite the source for each piece of artwork used in your project. Put a figure caption under the diagram or chart and then place the in-text citation at the end of the caption. See the example at the end of this file.

Research:

1. Review the Weekly readings.

2. Review recent changes in US Laws regarding the requirement for mobile friendly government websites.

a. https://www.congress.gov/115/plaws/publ114/PLAW-115publ114.pdf

b. https://www.nextgov.com/ideas/2018/01/what-digital-government-cx-pros-should-know-about-connected-government-act/144987/

c. https://www.fedscoop.com/bill-mobile-friendly-government-websites-cruises-senate/

3. Research the “best” of federal mobile apps to see examples of the type of apps that other agencies have created in the past.

a. 19 of the Coolest Government Mobile Apps https://www.govloop.com/community/blog/cool-gov-mobile-apps/

b. 10 Most Entertaining Government Mobile Apps https://www.govloop.com/community/blog/10-most-entertaining-government-mobile-apps/

c. 3 Innovative Ways Agencies are Leveraging Mobile Apps http://fedscoop.com/great-government-mobile-apps

4. Research the federal government’s perspective on mobile app security architectures and design recommendations. Here are three sources to help you get started:

a. App Developers: Start with Security
https://www.ftc.gov/tips-advice/business-center/guidance/app-developers-start-security

b. Mobile Security Reference Architecture
https://s3.amazonaws.com/sitesusa/wp-content/uploads/sites/1151/downloads/2013/05/Mobile-Security-Reference-Architecture.pdf

c. How to build a secure mobile app: 10 tips
https://www.techrepublic.com/article/how-to-build-a-secure-mobile-app-10-tips/

5. Research industry recommendations for mobile app security. Begin with the following sources:

a. OWASP Mobile Security Project https://www.owasp.org/index.php/OWASP_Mobile_Security_Project

b. Top 10 Mobile Risks (click on tab) https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Risks

c. Mobile app security: Always keep the back door locked http://arstechnica.com/security/2013/02/mobile-app-security-always-keep-the-back-door-locked/

6. Find five or more best practice recommendations for ensuring the security of mobile apps. These recommendations must include security for the platform (mobile device), the data on the device, and the transmission path between the device and the mobile application server. Your focus should be upon recommendations which can be implemented as part of a strategy for reducing risk.

Write:

Write a five to seven page report in which you summarize your research and present your “best practices” based strategy for reducing risk and ensuring security for government provided mobile apps and their users. You should focus upon clarity and conciseness more than length when determining what content to include in your paper. At a minimum, your report must include the following:

1. An introduction or overview of mobile apps for digital government. Your overview should include discussion of the Connected Government Act, examples of mobile apps which are recognized as being innovative, and “best of category” applications for delivering government information and services to mobile devices. This introduction should be suitable for an executive audience.

2. A separate section in which you discuss the federal government’s requirements and recommendations for mobile app security architectures and the associated design recommendations. This section should be written for non-technical managers; you will need to translate from tech-speak to manager-speak. Diagrams and pictures may be useful but, remember to include the appropriate in-text citations for the source (append to the figure caption).

3. A separate section in which you discuss industry’s recommendations for security architectures and risk reduction for mobile app security.

4. A section in which you present 5 or more best practice recommendations for building security into mobile applications used to deliver government information and services. These recommendations should be presented as a strategy for reducing risk.

5. A separate section in which you summarize your research and recommendations.

Submit For Grading

Submit your work in MS Word format (.docx or .doc file) using the Project 3 Assignment in your assignment folder. (Attach the file.)

Additional Information

1. Consult the grading rubric for specific content and formatting requirements for this assignment.

2. Your 5 to 7 page research report should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper.

3. Your paper should use standard terms and definitions for cybersecurity.

4. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx.

5. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s page count.

6. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.

7. Credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).

Example Diagram with Citation and Reference List Entry

Figure 1. Enterprise Core Services (Adapted from Figure 1 in CIO Council, 2013, p. 5)

Federal CIO Council & Department of Homeland Security. (2013). Mobile security reference architecture. Retrieved from https://s3.amazonaws.com/sitesusa/wp-content/‌uploads/sites/‌1151/‌downloads/‌2013/05/Mobile-Security-Reference-Architecture.pdf

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Essay Writing Help
Solution Provider
Top Academic Tutor
Instant Assignments
Professor Smith
Financial Hub
Writer Writer Name Offer Chat
Essay Writing Help

ONLINE

Essay Writing Help

I have done dissertations, thesis, reports related to these topics, and I cover all the CHAPTERS accordingly and provide proper updates on the project.

$24 Chat With Writer
Solution Provider

ONLINE

Solution Provider

I will provide you with the well organized and well research papers from different primary and secondary sources will write the content that will support your points.

$28 Chat With Writer
Top Academic Tutor

ONLINE

Top Academic Tutor

I reckon that I can perfectly carry this project for you! I am a research writer and have been writing academic papers, business reports, plans, literature review, reports and others for the past 1 decade.

$39 Chat With Writer
Instant Assignments

ONLINE

Instant Assignments

I am an academic and research writer with having an MBA degree in business and finance. I have written many business reports on several topics and am well aware of all academic referencing styles.

$21 Chat With Writer
Professor Smith

ONLINE

Professor Smith

I am an experienced researcher here with master education. After reading your posting, I feel, you need an expert research writer to complete your project.Thank You

$28 Chat With Writer
Financial Hub

ONLINE

Financial Hub

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$44 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Remove design consulting data series excel - Tourette D5 - The sculptor a0 oversaw building and decorating the parthenon - 1000 Word Essay - Bblearn griffith - Dead rising 1 all bosses and psychopaths - Ramona the pest chapter 1 - Water cycle poster drawing - Help with college accounting homework - Case Study - Iron palm water training - Sap upgrade impact analysis - Perception checking exercises - Blackpool council green bin - Insead abu dhabi fees - Discussion - Wj irwin solicitors dungannon - Serial socialization is characterized by the use of role models who train and encourage a newcomer. - Aquafresh toothpaste competition - Guyan machinery a west virginia manufacturing corporation - Assignment 5-1 - Deliverable 2 - Tutoring on the Normal Distribution - Stance jim and pam socks - Liquids with high viscosity flow quickly - Dmaic report - Metasploit cheat sheet pdf - Lone star stone dry stack - Orthodox outlet for dogmatic enquiries - Joey graceffa fantasy craft ep 18 - New century financial corporation case study answers - Monthly fire drill log template - Sifting property of dirac delta function - I wandered lonely as a cloud worksheet - Discussion - Which of the following statements is true of missionary salespeople - Reynolds george w information technology for managers 2016 pdf - Critical reasoning/ philosophy - Cambridge latin course unit 1 stage 8 translations - How to use charles law equation - The outsiders final scene - 20 1 dilution ratio - Balloon diameter to lung volume calculator - Fin 571 week 1 paper - Cherry pink and apple blossom white analysis - Gothicism in wuthering heights - How venture capitalists evaluate potential opportunities - Virginia henderson's nursing need theory - Spillover animal infections and the next human pandemic pdf - Tvi portugal - Writing Assignment: Illustration Essay - Difference between hrm and hrd in table form - Four main elements of the international business environment - Customer buying criteria capsim - NS P9 - Essay on library annual report - Draw six isomeric cyclopentanes of molecular formula - Journal of the first voyage to america christopher columbus - Discuss the following: 1. Explain the four types of business models for blockchain networks. 2. Explain how blockchain has the potential to change business models - Crime analysis - Hgt medical abbreviation glucose - How to analyse a picture in english - Andi peters production company - compare and contrast methods for evaluating evidence - Easter prayer for teachers - Self control - Berkshire instruments case study answers - Gen 499 week 1 assignment - Strategic planning stakeholder interview questions - What photosynthesis waste product is formed in the light reactions - Lord i need you - Beatles album eleanor rigby - True colors personality test - Discussion post research question/problem using PICOT format - What happens when two waves collide - Target corporation financial statements 2016 - Jasper jones how did laura die - Change management simulation power and influence scenario 1 - Casp cohort study checklist - Bass clef practice worksheet - This week we are working on faculty development models for distance learning. - What is the purpose of a windshield survey - Philosophy paper - Teaching of psychology - Eugene teo net worth - Post graduation adventure - Blumat bottle cap adapter - Evidence based practice - Characters in oliver twist - Heart failure - Nodal analysis supernode examples - Words that describe music - Comptia project+ exam dumps - Market research report - Composite restorations in anterior teeth fundamentals and possibilities - Concepts of biology samantha fowler pdf - Discussion Question - Strategic Human Resource Management - Divergent unveils part 3d printed supercar - Jointcommission org standards_i - The fundamentals of calorimetry lab report