Introduction to Cyber Security and Digital Crime- Project (Apple Pay). Each Report will be evaluated according to the marking criteria mentioned in each question section.
Project Phases:
- App Selection: Apple Pay
- Threat Identification:
- Security Control Evaluation:
- Recommendations:
- Presentation:
- The chosen app and its features.
- Identified security risks and vulnerabilities, mapped to specific attack types and adversary profiles.
- Evaluation of existing security controls.
- Prioritized recommendations for improvement, justifying each suggestion.
- Discussion of the intersection of security and reliability in your recommendations.
- One group member (group leader/coordinator) must submit all files (project report and presentation slides) on blackboard. Marks will be given based on your submission and quality of the contents.
- There is a presentation in the last week before the final exam. Students/Groups need to present their project (either F2F or Virtual).
- You should have PowerPoint slides, ranging from 10 to 15.
- Choose a popular and reputable mobile wallet app, justifying your selection based on factors like market share, security features, and available information.
- Analyze the app’s architecture, features, and underlying technologies to identify potential security risks and vulnerabilities.
- Research common mobile banking attacks and analyze how the chosen app addresses them (e.g., phishing, malware injection, man-in-the-middle attacks).
- Consider different adversary profiles during your analysis (e.g., casual vs. sophisticated attackers) and the specific threats they pose.
- Assess the existing security measures implemented by the app, including authentication, access control, data encryption, network security, and consider different adversary profiles during your evaluation, such as:
- Casual attackers:Opportunistic individuals looking for easy targets.
- Sophisticated attackers:Highly skilled individuals or groups with targeted motives
- Risk Assessment:
- Analyze the potential impact of identified vulnerabilities and prioritize them based on risk level, considering the likelihood and severity of an attack.
- Incorporate the different adversary profiles in your risk assessment and how they might exploit specific vulnerabilities.
- Suggest improvements and propose solutions to address the identified vulnerabilities.
- Prioritize recommendations based on their potential impact on security and consider trade-offs between security and usability.
- Where relevant, suggest improvements to the app’s development process or security testing methodology.
- Prepare and deliver a presentation summarizing your findings, including:
Remember:
- Stay within ethical boundaries and respect intellectual property rights.
- Focus on publicly available information about the app and avoid exploiting any vulnerabilities.
- Use your critical thinking skills to analyze information and draw well-supported conclusions.
- Communicate your findings effectively and clearly to a non-technical audience.
This project is an excellent opportunity to gain valuable hands-on experience in cybersecurity and showcase your critical thinking, analytical, and communication skills.
Note: Don’t using AI tools for the project and add the references for your project
Attached: word and ppt