Computer Science Homework Help

CST 620 UMGC Threat Modeling and Cyber Security Essay

 

In your role as a cyber threat analyst, senior management has entrusted you to identify how a particular mobile application of your choosing conforms to mobile architecture standards. You are asked to:

undefined

  1. Describe device-specific features used by the application, wireless transmission protocols, data transmission media, interaction with hardware components, and other applications.
  2. Identify the needs and requirements for application security, computing security, and device management and security.
  3. Describe the operational environment and use cases.
  4. Identify the operating system security and enclave/computing environment security concerns, if there are any.