Chapter 9 Discussion Executive Communication

docx

School

Trine University *

*We aren’t endorsed by this school

Course

5223

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

2

Uploaded by GrandSardine3285

Report
“Mobile App Developers: Start with Security” Apps and Mobile devices rely on consumer data, contact information, photos and consumer’s location. They can be vulnerable to snoops, data breaches and real-world thieves. The FTC (Federal Trade Commission) offers some tips to help developers approach mobile app security (Kolin, 2017) . There actually no checklists for securing all apps. When you have a more complex app you need additional security measures. Unfortunately, security threats happen very quickly. When creating an app, you should have at least one person responsible for security at each step of the development process (Kolin, 2017). When developing an app keep your data to a minimum and you need to research what mobile platform you are currently working with. There are a variety of application programming interfaces. If you expect one platform to work identically like another, you are wrong. Even though mobile platforms provide helpful security features, it is your responsibility to understand each security feature. How to utilize them properly and what other measures are needed to protect our users. When your app transfers usernames and passwords, you need to make sure that it is encrypted. This will prevent snoopers when you are on an unsecure Wi-Fi network from intercepting your connections. With fast-changing standards it is vital to pay attention to current technology so you can make sure you are using the newest security features available. Developers often release SSL/TLS in the form of HTTPS (Kolin, 2017). While using HTTPS, make sure you have a digital certificate, and that the app is using it correctly. If your server communicates with your app, make sure you take the correct steps to protect it. If your server has a data breach use an iterated cryptographic hash function so your users can reset their passwords (Kolin, 2017). In conclusion, new vulnerabilities and security breaches happen every day, you need to keep involved with your customers. Make sure you have a procedure set up so when security breaches happen, you can deliver security updates when needed. With these steps in place your customers should be security ready. References Kolin, P. C. (2017). Successful Writing at Work (11th ed.). Cengage Learning.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help