Mobile application threat modeling
ID how a particular mobile application of your choosing conforms to mobile architectures
â—¦ Devise a threat model from your findings and recommendations about your mobile application
â—¦ Include a data flow diagram that shows how data is handled and managed by the application
â—¦ Include mapping of controls to each specific method of attack
Everything must be related to the specific mobile application selected
Have provided an attachment with more details.
Threat Model
[name]
[date]
INTRODUCTION
[write an introduction of what the paper is about]
MOBILE APPLICATION ARCHITECTURE
[Describe the architecture of your mobile application. Integrate step1 description of mobile application architecture as it relates to your application]
REQUIREMENTS
[Define the requirements for your mobile application. Integrate step 2 requirements for your mobile application.]
THREATS AND THREAT AGENTS
[Describe the possible threats and agents to your mobile application. Integrate step 3 description of threats and threat agents to help define these issues that could
affect the application.]
METHODS OF ATTACKS
[Describe the methods of attacks that could affect your mobile application. Integrate step 4 methods of attacks to better prepare your description.]
ANALYSIS OF THREATS
[Prepare an analysis of the threats to your mobile application. Integrate step 5 analysis of mobile application threats to help you create this section of your
report.]
CONTROLS
[Describe the controls one can use to protect your mobile application. Integrate step 6 controls to prepare your controls section.]
CONCLUSION
[Discuss the main points from the paper and bring our important facts to help sell your ideas to the reader.]
REFERENCES
[create a list of all references use in paper and IAW APA style format]