Threat Model Report

Threat Model Report: An eight- to 10-page double-spaced Word document with citations in APA format. The report should include your findings and any recommendations for mitigating the threats found.

In your role as a cyber threat analyst, senior management has entrusted you to identify how a particular mobile application of your choosing conforms to mobile architecture standards. You are asked to:

1) Describe Your Mobile Application Architecture

a) Describe device-specific features used by the application, wireless transmission protocols, data transmission media, interaction with hardware components, and other applications.

b) Identify the needs and requirements for application security, computing security, and device management and security.

c) Describe the operational environment and use cases.

d) Identify the operating system security and enclave/computing environment security concerns, if there are any.

Include an overview of topics such as mobile platform security, mobile protocols and security, mobile security vulnerabilities, and related technologies and their security, in your report.

Include the Mobile Application considerations that are relevant to your mobile application

What is the design of the architecture (network infrastructure, web services, trust boundaries, third-party APIs, etc.)?

What are the common hardware components?

What are the authentication specifics?

What should or shouldn’t the app do?

2) Define the Requirements for Your Mobile Application

What is the business function of the app?

What data does the application store/process (provide data flow diagram)?

The diagram outlines network, device file system, and application data flows

How are data transmitted between third-party APIs and app(s)?

Will there be remote access and connectivity? Read this resource about mobile VPN security, and include any of these security issues in your report.

Are there different data-handling requirements between different mobile platforms? (iOS/Android/Blackberry/Windows/J2ME)

Does the app use cloud storage APIs (e.g., Dropbox, Google Drive, iCloud, Lookout) for device data backups

Is there specific business logic built into the app to process data?

What does the data give you (or an attacker) access to? Think about data at rest and data in motion as they relate to your app.

Do stored credentials provide authentication?

Do stored keys allow attackers to break crypto functions (data integrity)?

Are third-party data being stored and/or transmitted?

What are the privacy requirements of user data? Consider, for example, a unique device identifier (UDID) or geolocation being transmitted to a third party.

Are there user privacy-specific regulatory requirements to meet?

How do other data on the device affect the app? Consider, for example, authentication credentials shared between apps.

Compare between jailbroken (i.e., a device with hacked or bypassed digital rights software) and non-jailbroken devices.

How do the differences affect app data? This can also relate to threat agent identification.

3) Identify Threats and Threat Agents

Identify possible threats to the mobile application and Threat agents

Outline the process for defining what threats apply to your mobile application

Does personal data intermingle with corporate data?

3) Identify Methods of Attack

Provide senior management an understanding of the possible methods of attack of your app.

4) Controls

What are the controls to prevent an attack? Conduct independent research, then define these controls by platform (e.g., Apple iOS, Android, Windows Mobile, BlackBerry).

What are the controls to detect an attack? Define these controls by platform.

What are the controls to mitigate/minimize impact of an attack? Define these controls by platform.

What are the privacy controls (i.e., controls to protect users’ private information)? An example of this would be a security prompt for users to access an address book or geolocation.

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with Boom Grades
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
Testimonials
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
Public Health
Thank you so much !!
Customer 452589, November 28th, 2023
english comp
Great paper and done before the deadline. Thank you
Customer 452509, June 15th, 2021
world civilization
Thank you for the quick response
Customer 452509, June 27th, 2021
Religious studies
I recommend this service they always help. I got an A in this project thanks.
Customer 452507, October 5th, 2021
english comp
Thank you for all your hard time.
Customer 452509, June 27th, 2021
Exercise Science
Thank you so much for your time.
Customer 452545, December 5th, 2021
Gerontology
Thank you so much this looks great !!!!
Customer 452585, November 4th, 2023
English 101
perfect! thanks!
Customer 452543, December 1st, 2021
Literature
Absolutely LOVE having help especially from the person who wrote this last one. THANK YOU
Customer 452529, November 19th, 2021
English comp
Got a 94% thank you!
Customer 452509, June 27th, 2021
Classic English Literature
Awesome Job... you are the best!
Customer 452531, November 27th, 2021
Classic English Literature
Absolutely LOVE the essay I received. I really appreciate it so much.
Customer 452529, October 25th, 2021
11,595
Customer reviews in total
96%
Current satisfaction rate
3 pages
Average paper length
37%
Customers referred by a friend
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat