Introduction to Cyber Security and Digital Crime- Project (Apple Pay). Each Report will be evaluated according to the marking criteria mentioned in each question section.

Project Phases:

  • App Selection: Apple Pay
  • Threat Identification:
  • Security Control Evaluation:
  • Recommendations:
  • Presentation:
    • The chosen app and its features.
    • Identified security risks and vulnerabilities, mapped to specific attack types and adversary profiles.
    • Evaluation of existing security controls.
    • Prioritized recommendations for improvement, justifying each suggestion.
    • Discussion of the intersection of security and reliability in your recommendations.
    • One group member (group leader/coordinator) must submit all files (project report and presentation slides) on blackboard. Marks will be given based on your submission and quality of the contents.
    • There is a presentation in the last week before the final exam. Students/Groups need to present their project (either F2F or Virtual).
    • You should have PowerPoint slides, ranging from 10 to 15.
  • Choose a popular and reputable mobile wallet app, justifying your selection based on factors like market share, security features, and available information.
  • Analyze the app’s architecture, features, and underlying technologies to identify potential security risks and vulnerabilities.
  • Research common mobile banking attacks and analyze how the chosen app addresses them (e.g., phishing, malware injection, man-in-the-middle attacks).
  • Consider different adversary profiles during your analysis (e.g., casual vs. sophisticated attackers) and the specific threats they pose.
  • Assess the existing security measures implemented by the app, including authentication, access control, data encryption, network security, and consider different adversary profiles during your evaluation, such as:
    • Casual attackers:Opportunistic individuals looking for easy targets.
    • Sophisticated attackers:Highly skilled individuals or groups with targeted motives
Cyber Security Best Practices and Monitoring

Cyber Security Best Practices and Monitoring

  1. Risk Assessment:
  • Analyze the potential impact of identified vulnerabilities and prioritize them based on risk level, considering the likelihood and severity of an attack.
  • Incorporate the different adversary profiles in your risk assessment and how they might exploit specific vulnerabilities.
  • Suggest improvements and propose solutions to address the identified vulnerabilities.
  • Prioritize recommendations based on their potential impact on security and consider trade-offs between security and usability.
  • Where relevant, suggest improvements to the app’s development process or security testing methodology.
  • Prepare and deliver a presentation summarizing your findings, including:

Remember:

  • Stay within ethical boundaries and respect intellectual property rights.
  • Focus on publicly available information about the app and avoid exploiting any vulnerabilities.
  • Use your critical thinking skills to analyze information and draw well-supported conclusions.
  • Communicate your findings effectively and clearly to a non-technical audience.

This project is an excellent opportunity to gain valuable hands-on experience in cybersecurity and showcase your critical thinking, analytical, and communication skills.

Note: Don’t using AI tools for the project and add the references for your project

Attached: word and ppt