Bella Capelli Academy Mobile Application Threat Modeling Project - Programming
Project 3 is 8 pagesProject 5 is 10 pagesDetails are attached below.................
project_3_instructions.docx
umgc_cst_620_project_5.docx
Unformatted Attachment Preview
Project 3: Mobile Application Threat Modeling
Threat Model Report: An eight- to 10-page double-spaced Word document with citations
in APA format. The report should include your findings and any recommendations for
mitigating the threats found. The page count does not include figures, diagrams, tables, or
citations.
Threat modeling begins with a clear understanding of the system in question. There are
several areas to consider when trying to understand threats to an application. The areas of
concern include the mobile application structure, the data, identifying threat agents and
methods of attack, and controls to prevent attacks. The threat model should be created with an
outline or checklist of items that need to be documented, reviewed, and discussed when
developing a mobile application.
In this project, you will create a threat model. There are seven steps that will lead you through
this project, beginning with the scenario as it might occur in the workplace, and continuing
with Step 1: “Describe Your Mobile Application Architecture.” Most steps in this project
should take no more than two hours to complete, and the project as a whole should take no
more than two weeks to complete.
The following are the deliverables for this project:
Step 1: Describe Your Mobile Application Architecture
In your role as a cyber threat analyst, senior management has entrusted you to identify how a
particular mobile application of your choosing conforms to mobile architecture standards.
You are asked to:
1. Describe device-specific features used by the application, wireless transmission
protocols, data transmission media, interaction with hardware components, and other
applications.
2. Identify the needs and requirements for application security, computing security, and
device management and security.
3. Describe the operational environment and use cases.
4. Identify the operating system security and enclave/computing environment security
concerns, if there are any.
This can be fictional or modeled after a real-world application. This will be part of your final
report. Click the following links and review the topics and their resources. These resources
will guide you in completing this task:
•
•
•
•
network security threats
threat modeling
mobile architectures
application security
•
•
operating system security
enclave/computing environment
Begin by first reviewing the OWASP Mobile Security Project Testing Guide.
Architecture Considerations
Although mobile applications vary in function, they can be described in general as follows:
•
•
•
•
•
•
•
wireless interfaces
transmission type
hardware interaction
interaction with on device applications/services
interaction with off device applications/services
encryption protocols
platforms
In Section 1 of your research report, you will focus your discussion on the security threats,
vulnerabilities, and mitigations of the above considerations.
The following resources will continue to educate your management about mobile devices and
mobile application security: mobile platform security, mobile protocols and security, mobile
security vulnerabilities, and related technologies and their security. Related technologies can
include the hardware and software needed to interoperate with mobile devices and mobile
applications.
Include an overview of these topics in your report.
Use Mobile Application and Architecture Considerations to review the architectural
considerations for mobile applications and architecture. Then, include those that are relevant
to your mobile application in your report to senior management. Address the following
questions:
1. What is the design of the architecture (network infrastructure, web services, trust
boundaries, third-party APIs, etc.)?
2. What are the common hardware components?
3. What are the authentication specifics?
4. What should or shouldnt the app do?
You will include this information in your report.
When you have completed the work for Section 1, describing the architecture for your app,
move on to the next step, where you will define the requirements for the app.
Step 2: Define the Requirements for Your Mobile Application
In the previous step, you described your app’s architecture. In Step 2, you will define what
purpose the mobile app serves from a business perspective and what data the app will store,
transmit, and receive. Include a data flow diagram to showing exactly how data are handled
and managed by the application. You can use fictional information or model it after a real world application. Here are some questions to consider as you define your requirements:
1. What is the business function of the app?
2. What data does the application store/process? (provide data flow diagram)
a. This diagram should outline network, device file system, and application data
flows
b. How are data transmitted between third-party APIs and app(s)?
c. Will there be remote access and connectivity? Read this resource about mobile
VPN security, and include any of these security issues in your report.
d. Are there different data-handling requirements between different mobile
platforms? (iOS/Android/Windows/J2ME)
e. Does the app use cloud storage APIs (e.g., Dropbox, Google Drive, iCloud,
Lookout) for device data backups?
f. Does personal data intermingle with corporate data?
g. Is there specific business logic built into the app to process data?
3. What does the data give you (or an attacker) access to? Think about data at
restand data in motion as they relate to your app.
a. Do stored credentials provide authentication?
b. Do stored keys allow attackers to break crypto functions (data integrity)?
4. Are third-party data being stored and/or transmitted?
a. What are the privacy requirements of user data? Consider, for example, a
unique device identifier (UDID) or geolocation being transmitted to a third
party.
b. Are there user privacy-specific regulatory requirements to meet?
5. How do other data on the device affect the app? Consider, for example, authentication
credentials shared between apps.
6. Compare between jailbroken (i.e., a device with hacked or bypassed digital rights
software) and nonjailbroken devices.
a. How do the differences affect app data? This can also relate to threat agent
identification.
In this step, you defined the app’s requirements. Move to the next step, where you will
identify any threats to the app’s operation.
Step 3: Identify Threats and Threat Agents
Now that you have identified the mobile app’s requirements, you will define its threats.
In Section 3 of the report, you will:
1. Identify possible threats to the mobile application
a. Identify the threat agents
2. Outline the process for defining what threats apply to your mobile application
Review this threat agent identification example resource.
Review this list of threat agents.
After you have identified threats and threat agents, move to the next step, where you will
consider the ways an attacker might reach your app’s data.
Step 4: Identify Methods of Attack
In the previous step, you identified threat agents. In this step and in Section 4 of the report,
you will identify different methods an attacker can use to reach the data. These data can be
sensitive information to the device or something sensitive to the app itself.
Read these resources on cyberattacks.
Provide senior management an understanding of the possible methods of attack of your app.
When you have identified the attack methods, move to the next step, where you will analyze
threats to your app.
Step 5: Consider Controls
You have identified the methods of attack, and now you will discuss the controls to prevent
attacks. Consider the following questions:
Note: Not all of the following may apply. You will address only the areas that apply to the
application you have chosen.
•
•
•
•
•
What are the controls to prevent an attack? Conduct independent research and then
define these controls by platform (e.g., Apple iOS, Android, Windows Mobile).
What are the controls to detect an attack? Define these controls by platform.
What are the controls to mitigate/minimize impact of an attack? Define these controls
by platform.
What are the privacy controls (i.e., controls to protect users’ private information)? An
example of this would be a security prompt for users to access an address book or
geolocation.
Create a mapping of controls to each specific method of attack (defined in the previous
step)
o Create a level of assurance framework based on controls implemented. This
would be subjective to a certain point, but it would be useful in guiding
organizations that want to achieve a certain level of risk management based on
the threats and vulnerabilities.
UMGC CST 620
Project 5: Database Security Assessment
Modern health care systems incorporate databases for effective and efficient management of
patient health care. Databases are vulnerable to cyberattacks and must be designed and built
with security controls from the beginning of the life cycle.
Although hardening the database early in the life cycle is better, security is often incorporated
after deployment, forcing hospital and health care IT professionals to play catch-up. Database
security requirements should be defined at the requirements stage of acquisition and
procurement.
System security engineers and other acquisition personnel can effectively assist vendors in
building better health care database systems by specifying security requirements up front
within the request for proposal (RFP). In this project, you will be developing an RFP for a
new medical health care database management system.
Parts of your deliverables will be developed through your learning lab. You will submit the
following deliverables for this project:
Deliverables
•
An RFP, about 10 to 12 pages, in the form of a double-spaced Word document with
citations in APA format. The page count does not include figures, diagrams, tables, or
citations. There is no penalty for using additional pages. Include a minimum of six
references. Include a reference list with the report.
Step 1: Provide an Overview for Vendors
As the contracting officers technical representative (COTR), you are the liaison between your
hospital and potential vendors. It is your duty to provide vendors with an overview of your
organization. To do so, identify information about your hospital. Conduct independent
research on hospital database management. Think about the hospitals different organization al
needs. What departments or individuals will use the Security Concerns Common to All
RDBMSs, and for what purposes?
Provide an overview with the types of data that may be stored in the system and the
importance of keeping these data secure. Include this information in the RFP.
After the overview is complete, move to the next step to provide context for the vendors with
an overview of needs.
Step 2: Provide Context for the Work
Now that you have provided vendors with an overview of your hospitals needs, you will
provide the vendors with a context for the work needed.
Since you are familiar with the application and implementation, give guidance to the vendors
by explaining the attributes of the database and by describing the environment in which it will
operate. Details are important in order for the vendors to provide optimal services.
It is important to understand the vulnerability of a relational database management system
(RDBMS). Read the following resources about RDBMSs.
•
•
•
•
•
•
•
error handling and information leakage
insecure handling
cross-site scripting (XSS/CSRF) flaws
SQL injections
insecure configuration management
authentication (with a focus on broken authentication)
access control (with a focus on broken access control)
Describe the security concepts and concerns for databases.
Identify at least three security assurance and security functional requirements for the database
that contain information for medical personnel and emergency responders.
Include this information in the RFP.
In the next step, you will provide security standards for the vendors.
Step 3: Provide Vendor Security Standards
In the previous step, you added context for the needed work. Now, provide a set of
internationally recognized standards that competing vendors will incorporate into the
database. These standards will also serve as a checklist to measure security performance and
security processes.
Read the following resources to prepare:
•
•
•
•
database models
Common Criteria (CC) for information technology security evaluation
evaluated assurance levels (EALs)
continuity of service
Address the concepts and issues with respect to disasters and disaster recovery, mission
continuity, threats, and cyberattacks.
Include these security standards in the RFP.
In the next step, you will describe defense models for the RFP.
Step 4: Describe Defense Models
Now that you have established security standards for the RFP, you will define the use of
defense models. This information is important since the networking environment will have
numerous users with different levels of access.
Provide requirements in the RFP for the vendor to state its overall strategy for defensiv e
principles. Explain the importance of understanding these principles. To further your
understanding, click the link and read about defensive principles.
Read these resources on enclave computing environment:
•
•
enclave/computing environment
cyber operations in DoD policy and plans
Explain how enclave computing relates to defensive principles. The network domains should
be at different security levels, have different levels of access, and different read and write
permissions.
Define enclave computing boundary defense.
Include enclave firewalls to separate databases and networks.
Define the different environments you expect the databases to be working in and the security
policies applicable.
Provide this information in the RFP.
In the next step, you will consider database defenses.
Step 5: Provide a Requirement Statement for System Structure
In the previous step, you identified defense requirements for the vendor. In this step of the
RFP, you will focus on the structure of the system.
Provide requirement statements for a web interface to:
1. Allow patients and other health care providers to view, modify, and update the
database.
2. Allow integrated access across multiple systems.
3. Prevent data exfiltration through external media.
State these requirements in the context of the medical database. Include this information in the
RFP.
In the next step, you will outline operating system security components.
Step 6: Provide Operating System Security Components
In the previous step, you composed requirement statements regarding the system setup. In this
step, you will provide the operating system security components that will support the database
and the security protection mechanisms.
Read these resources on operating system security. Then:
1. Provide requirements for segmentation by operating system rings to ensure processes
do not affect each other.
2. Provide one example of a process that could violate the segmentation mechanism.
Ensure your requirement statements prevent such a violation from occurring.
Specify requirement statements that include a trusted platform module (TPM), in which a
cryptographic key is supplied at the chip level. In those specifications:
1. Describe the expected security gain from incorporating TPM.
2. Provide requirement statements that adhere to the trusted computing base (TCB)
standard.
3. Provide examples of components to consider in the TCB.
4. Provide requirements of how to ensure protection of these components, such as
authentication procedures and malware protection.
Read the following resources to familiarize yourself with these concepts:
•
•
trusted computing
trusted computing base
Include this information in the RFP.
In the following step, you will write requirements for levels of security.
Step 7: Write Requirements for Multiple Independent Levels of Security
The previous step required you to identify operating system security components to support
the database. For this step, you will focus on identification, authentication, and access. Access
to the data is accomplished using security concepts and security models that ensure
confidentiality and integrity of the data. Refer to access control and authentication to refresh
your knowledge.
The healthcare database should be able to incorporate multiple independent levels of security
(MILS) because the organization plans to expand the number of users.
Write requirement statements for MILS for your database in the RFP.
1. Include the definitions and stipulations for cybersecurity models, including the Biba
Integrity Model, Bell-LaPadula Model, and the Chinese Wall Model.
2. Indicate any limitations for the application of these models.
Read the following resources and note which cybersecurity models are most beneficial to your
database:
•
•
•
multiple independent levels of security (MILS)
cybersecurity models
insecure handling
Include requirement statements for addressing insecure handling of data.
Include this information in your RFP.
In the next step, you will consider access control.
Step 8: Include Access Control Concepts, Capabilities
In the previous step, you wrote requirements for multiple levels of security, including the
topics of identification, authentication, and access. In this step, you will focus on access
control. The vendor will need to demonstrate capabilities to enforce identification,
authentication, access, and authorization to the database management systems.
Include requirement statements in the RFP that the vendor must identify, the types of access
control capabilities, and how they execute access control.
Provide requirement statements for the vendor regarding access
control concepts, authentication, and direct object access.
Include the requirement statements in the RFP.
In the next step, you will incorporate additional security requirements and request vendors to
provide a test plan.
Step 9: Include Test Plan Requirements
In the previous step, you defined access control requirements. Here, you will define test plan
requirements for vendors.
Incorporate a short paragraph requiring the vendor to propose a test plan after reviewing
these guidelines for a test and remediation results (TPRR) report.
Provide requirements for the vendor to supply an approximate timeline for the delivery of
technology.
Step 10: Compile the RFP Document
In this final step, you will compile the RFP for a secure health care database mana gement
system. Review the document to make sure nothing is missed before submission. Submit the
following deliverables to your assignment folder.
...
Purchase answer to see full
attachment
CATEGORIES
Economics
Nursing
Applied Sciences
Psychology
Science
Management
Computer Science
Human Resource Management
Accounting
Information Systems
English
Anatomy
Operations Management
Sociology
Literature
Education
Business & Finance
Marketing
Engineering
Statistics
Biology
Political Science
Reading
History
Financial markets
Philosophy
Mathematics
Law
Criminal
Architecture and Design
Government
Social Science
World history
Chemistry
Humanities
Business Finance
Writing
Programming
Telecommunications Engineering
Geography
Physics
Spanish
ach
e. Embedded Entrepreneurship
f. Three Social Entrepreneurship Models
g. Social-Founder Identity
h. Micros-enterprise Development
Outcomes
Subset 2. Indigenous Entrepreneurship Approaches (Outside of Canada)
a. Indigenous Australian Entrepreneurs Exami
Calculus
(people influence of
others) processes that you perceived occurs in this specific Institution Select one of the forms of stratification highlighted (focus on inter the intersectionalities
of these three) to reflect and analyze the potential ways these (
American history
Pharmacology
Ancient history
. Also
Numerical analysis
Environmental science
Electrical Engineering
Precalculus
Physiology
Civil Engineering
Electronic Engineering
ness Horizons
Algebra
Geology
Physical chemistry
nt
When considering both O
lassrooms
Civil
Probability
ions
Identify a specific consumer product that you or your family have used for quite some time. This might be a branded smartphone (if you have used several versions over the years)
or the court to consider in its deliberations. Locard’s exchange principle argues that during the commission of a crime
Chemical Engineering
Ecology
aragraphs (meaning 25 sentences or more). Your assignment may be more than 5 paragraphs but not less.
INSTRUCTIONS:
To access the FNU Online Library for journals and articles you can go the FNU library link here:
https://www.fnu.edu/library/
In order to
n that draws upon the theoretical reading to explain and contextualize the design choices. Be sure to directly quote or paraphrase the reading
ce to the vaccine. Your campaign must educate and inform the audience on the benefits but also create for safe and open dialogue. A key metric of your campaign will be the direct increase in numbers.
Key outcomes: The approach that you take must be clear
Mechanical Engineering
Organic chemistry
Geometry
nment
Topic
You will need to pick one topic for your project (5 pts)
Literature search
You will need to perform a literature search for your topic
Geophysics
you been involved with a company doing a redesign of business processes
Communication on Customer Relations. Discuss how two-way communication on social media channels impacts businesses both positively and negatively. Provide any personal examples from your experience
od pressure and hypertension via a community-wide intervention that targets the problem across the lifespan (i.e. includes all ages).
Develop a community-wide intervention to reduce elevated blood pressure and hypertension in the State of Alabama that in
in body of the report
Conclusions
References (8 References Minimum)
*** Words count = 2000 words.
*** In-Text Citations and References using Harvard style.
*** In Task section I’ve chose (Economic issues in overseas contracting)"
Electromagnetism
w or quality improvement; it was just all part of good nursing care. The goal for quality improvement is to monitor patient outcomes using statistics for comparison to standards of care for different diseases
e a 1 to 2 slide Microsoft PowerPoint presentation on the different models of case management. Include speaker notes... .....Describe three different models of case management.
visual representations of information. They can include numbers
SSAY
ame workbook for all 3 milestones. You do not need to download a new copy for Milestones 2 or 3. When you submit Milestone 3
pages):
Provide a description of an existing intervention in Canada
making the appropriate buying decisions in an ethical and professional manner.
Topic: Purchasing and Technology
You read about blockchain ledger technology. Now do some additional research out on the Internet and share your URL with the rest of the class
be aware of which features their competitors are opting to include so the product development teams can design similar or enhanced features to attract more of the market. The more unique
low (The Top Health Industry Trends to Watch in 2015) to assist you with this discussion.
https://youtu.be/fRym_jyuBc0
Next year the $2.8 trillion U.S. healthcare industry will finally begin to look and feel more like the rest of the business wo
evidence-based primary care curriculum. Throughout your nurse practitioner program
Vignette
Understanding Gender Fluidity
Providing Inclusive Quality Care
Affirming Clinical Encounters
Conclusion
References
Nurse Practitioner Knowledge
Mechanics
and word limit is unit as a guide only.
The assessment may be re-attempted on two further occasions (maximum three attempts in total). All assessments must be resubmitted 3 days within receiving your unsatisfactory grade. You must clearly indicate “Re-su
Trigonometry
Article writing
Other
5. June 29
After the components sending to the manufacturing house
1. In 1972 the Furman v. Georgia case resulted in a decision that would put action into motion. Furman was originally sentenced to death because of a murder he committed in Georgia but the court debated whether or not this was a violation of his 8th amend
One of the first conflicts that would need to be investigated would be whether the human service professional followed the responsibility to client ethical standard. While developing a relationship with client it is important to clarify that if danger or
Ethical behavior is a critical topic in the workplace because the impact of it can make or break a business
No matter which type of health care organization
With a direct sale
During the pandemic
Computers are being used to monitor the spread of outbreaks in different areas of the world and with this record
3. Furman v. Georgia is a U.S Supreme Court case that resolves around the Eighth Amendments ban on cruel and unsual punishment in death penalty cases. The Furman v. Georgia case was based on Furman being convicted of murder in Georgia. Furman was caught i
One major ethical conflict that may arise in my investigation is the Responsibility to Client in both Standard 3 and Standard 4 of the Ethical Standards for Human Service Professionals (2015). Making sure we do not disclose information without consent ev
4. Identify two examples of real world problems that you have observed in your personal
Summary & Evaluation: Reference & 188. Academic Search Ultimate
Ethics
We can mention at least one example of how the violation of ethical standards can be prevented. Many organizations promote ethical self-regulation by creating moral codes to help direct their business activities
*DDB is used for the first three years
For example
The inbound logistics for William Instrument refer to purchase components from various electronic firms. During the purchase process William need to consider the quality and price of the components. In this case
4. A U.S. Supreme Court case known as Furman v. Georgia (1972) is a landmark case that involved Eighth Amendment’s ban of unusual and cruel punishment in death penalty cases (Furman v. Georgia (1972)
With covid coming into place
In my opinion
with
Not necessarily all home buyers are the same! When you choose to work with we buy ugly houses Baltimore & nationwide USA
The ability to view ourselves from an unbiased perspective allows us to critically assess our personal strengths and weaknesses. This is an important step in the process of finding the right resources for our personal learning style. Ego and pride can be
· By Day 1 of this week
While you must form your answers to the questions below from our assigned reading material
CliftonLarsonAllen LLP (2013)
5 The family dynamic is awkward at first since the most outgoing and straight forward person in the family in Linda
Urien
The most important benefit of my statistical analysis would be the accuracy with which I interpret the data. The greatest obstacle
From a similar but larger point of view
4 In order to get the entire family to come back for another session I would suggest coming in on a day the restaurant is not open
When seeking to identify a patient’s health condition
After viewing the you tube videos on prayer
Your paper must be at least two pages in length (not counting the title and reference pages)
The word assimilate is negative to me. I believe everyone should learn about a country that they are going to live in. It doesnt mean that they have to believe that everything in America is better than where they came from. It means that they care enough
Data collection
Single Subject Chris is a social worker in a geriatric case management program located in a midsize Northeastern town. She has an MSW and is part of a team of case managers that likes to continuously improve on its practice. The team is currently using an
I would start off with Linda on repeating her options for the child and going over what she is feeling with each option. I would want to find out what she is afraid of. I would avoid asking her any “why” questions because I want her to be in the here an
Summarize the advantages and disadvantages of using an Internet site as means of collecting data for psychological research (Comp 2.1) 25.0\% Summarization of the advantages and disadvantages of using an Internet site as means of collecting data for psych
Identify the type of research used in a chosen study
Compose a 1
Optics
effect relationship becomes more difficult—as the researcher cannot enact total control of another person even in an experimental environment. Social workers serve clients in highly complex real-world environments. Clients often implement recommended inte
I think knowing more about you will allow you to be able to choose the right resources
Be 4 pages in length
soft MB-920 dumps review and documentation and high-quality listing pdf MB-920 braindumps also recommended and approved by Microsoft experts. The practical test
g
One thing you will need to do in college is learn how to find and use references. References support your ideas. College-level work must be supported by research. You are expected to do that for this paper. You will research
Elaborate on any potential confounds or ethical concerns while participating in the psychological study 20.0\% Elaboration on any potential confounds or ethical concerns while participating in the psychological study is missing. Elaboration on any potenti
3 The first thing I would do in the family’s first session is develop a genogram of the family to get an idea of all the individuals who play a major role in Linda’s life. After establishing where each member is in relation to the family
A Health in All Policies approach
Note: The requirements outlined below correspond to the grading criteria in the scoring guide. At a minimum
Chen
Read Connecting Communities and Complexity: A Case Study in Creating the Conditions for Transformational Change
Read Reflections on Cultural Humility
Read A Basic Guide to ABCD Community Organizing
Use the bolded black section and sub-section titles below to organize your paper. For each section
Losinski forwarded the article on a priority basis to Mary Scott
Losinksi wanted details on use of the ED at CGH. He asked the administrative resident