Question: Please I need help in solving the following: My goal is to thoroughly analyze a chosen Mobile Wallet App and identify potential security risks and
Please I need help in solving the following:
My goal is to thoroughly analyze a chosen Mobile Wallet App and identify potential security risks and vulnerabilities. then evaluate the existing security controls in place and recommend improvements to strengthen the app's security posture.
Project Phases:
App Selection:
Choose a popular and reputable mobile wallet app like paypal, google pay, it's prefered to use an app that exists in KSA region if possible like Stc pay or Urpayjustifying your selection based on factors like market share,security features,and available information.
Threat Identification:
Analyze the app's architecture, features, and underlying technologies to identify potential security risks and vulnerabilities.
Research common mobile banking attacks and analyze how the chosen app addresses them eg phishing, malware injection, maninthemiddle attacks
Consider different adversary profiles during your analysis eg casual vs sophisticated attackers and the specific threats they pose.
Security Control Evaluation:
Assess the existing security measures implemented by the app,including authentication,access control,data encryption,network security,andconsider different adversary profilesduring your evaluation,such as:
Casual attackers:Opportunistic individuals looking for easy targets. Sophisticated attackers:Highly skilled individuals or groups with targeted motives.
Risk Assessment:
Analyze the potential impact of identified vulnerabilities and prioritize them based on risk level, considering the likelihood and severity of an attack.
Incorporate the different adversary profiles in your risk assessment and how they might exploit specific vulnerabilities.
Recommendations:
Suggest improvements and propose solutions to address the identified vulnerabilities.
Prioritize recommendations based on their potential impact on security and consider tradeoffs between security and usability.
Where relevant, suggest improvements to the app's development process or security testing methodology.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
