Question: Please I need help in solving the following: My goal is to thoroughly analyze a chosen Mobile Wallet App and identify potential security risks and

Please I need help in solving the following:
My goal is to thoroughly analyze a chosen Mobile Wallet App and identify potential security risks and vulnerabilities. then evaluate the existing security controls in place and recommend improvements to strengthen the app's security posture.
Project Phases:
1. App Selection:
Choose a popular and reputable mobile wallet app (like paypal, google pay, it's prefered to use an app that exists in KSA region if possible like Stc pay or Urpay),justifying your selection based on factors like market share,security features,and available information.
2. Threat Identification:
Analyze the app's architecture, features, and underlying technologies to identify potential security risks and vulnerabilities.
Research common mobile banking attacks and analyze how the chosen app addresses them (e.g., phishing, malware injection, man-in-the-middle attacks).
Consider different adversary profiles during your analysis (e.g., casual vs. sophisticated attackers) and the specific threats they pose.
3. Security Control Evaluation:
Assess the existing security measures implemented by the app,including authentication,access control,data encryption,network security,andconsider different adversary profilesduring your evaluation,such as:
Casual attackers:Opportunistic individuals looking for easy targets. Sophisticated attackers:Highly skilled individuals or groups with targeted motives.
Risk Assessment:
Analyze the potential impact of identified vulnerabilities and prioritize them based on risk level, considering the likelihood and severity of an attack.
Incorporate the different adversary profiles in your risk assessment and how they might exploit specific vulnerabilities.
5. Recommendations:
Suggest improvements and propose solutions to address the identified vulnerabilities.
Prioritize recommendations based on their potential impact on security and consider trade-offs between security and usability.
Where relevant, suggest improvements to the app's development process or security testing methodology.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!