Computer Science Homework Help
CST 620 UMGC Threat Modeling and Cyber Security Essay
In your role as a cyber threat analyst, senior management has entrusted you to identify how a particular mobile application of your choosing conforms to mobile architecture standards. You are asked to:
undefined
- Describe device-specific features used by the application, wireless transmission protocols, data transmission media, interaction with hardware components, and other applications.
- Identify the needs and requirements for application security, computing security, and device management and security.
- Describe the operational environment and use cases.
- Identify the operating system security and enclave/computing environment security concerns, if there are any.