ID how a particular mobile application of your choosing conforms to mobile architectures
â—¦ Devise a threat model from your findings and recommendations about your mobile application
â—¦ Include a data flow diagram that shows how data is handled and managed by the application
â—¦ Include mapping of controls to each specific method of attack