Question: Assignment Instructions: This is a group task with maximum number of two members per group The Assignment should be submitted using Blackboard in the form

Assignment Instructions: This is a group task
Assignment Instructions: This is a group task with maximum number of two members per group The Assignment should be submitted using Blackboard in the form of a pdf file as well as an MS- Word file. One submission per group on Blackboard. Any form of cheating or plagiarism will result in receiving zero The deadline for this task is Tuesday, November 30, 2021 by 11:59 PM Late submission is accepted within five days with a note that -3 of the grade will be assigned for a late submission for each day. File format: A properly formatted word document file written in font size of 12, Times New Roman, Line spacing 1.0 as well as its pdf file. Each member of the group will be graded based on following criteria: o Team work (10 marks) Individual contribution (10 marks) Case Saudi Arabia is making a rapid progress in implementing computing solutions for facilitating its citizens and residents to use the electronic platforms and various mobile as well as web applications for various services. The users of those applications are required to take appropriate appointment or order for something of their choice while avoiding hustle, fatigue and long waiting hours. But at the same time, it requires addressing various information security related issues like communication security, authentication, privacy Suppose that your company has won a contract to develop a mobile application for Saudi Arabia called "All-in-one-app" for providing all study related services in one application. In this case study, you are required to identify and judge such issues for your application and list the steps that you will take to ensure that you successfully fulfill the following requirements by following the ethical guidelines that you learned in corresponding topics in the course 1. Communication channel is secure for secure communication of the data (4 marks) 2. User authentication is secure enough to stop unauthorized login attempts (4 marks) 3. Privacy of users is not compromised (4 marks) 4. All-in-one-app follows the relevant CTC (Communications and Information Technology Commission) and Saudi NCA (National Cybersecurity Authority) policies (4 marks) 5. Relevant intellectual property rights are not violated (4 marks) Please note that your answer should keep in view the relevant guidelines and policies of National Cybersecurity Authority (NCA) and Communications and Information Technology Commission (CITC)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!