Student Name Instructor Course 25th March 2017 Vulnerability Assessment Asset Identification In the contemporary world run blindly by Android majorly by Android devices there are high security concerns over information exchange over the air. Today owning an Android device is so easy to acquire regardless of its security concerns. Surprisingly the Google device Nexus which also runs the Android OS is the most secure Android on a manufacturer device scaling as compared to other Manufactures. My preferred Android device is HTC One even though the manufacturer scale places it at position seven in security support ("Scores - Android Vulnerabilities"). The HTC One is a sleek device that comes in handy with an internet key on its screen that allows easy navigation to the Internet. This makes it fun to use. Powered by Android 4.1 the device appeals to the current security issues. In Android 4.1 the cookies handling issues largely managed by the user. References Alabrah Amerah et al. "Enhancing Security Of Cookie-Based Sessions In Mobile Networks Using Sparse Caching". International Journal Of Information Security vol 13 no. 4 2013 pp. 355-366. Springer Nature doi:10.1007/s10207-013-0223-8. "Android Is Most-Attacked Mobile Platform". Network Security vol 2011 no. 9 2011 pp. 2-20. Elsevier BV doi:10.1016/s1353-4858(11)70091-5. Nale Nayana M. and Shilpa R. Landge. "Real-Time Carpooling Application For Android Platform". International Journal Of Engineering And Computer Science vol 5 no. 3 2016 Research And Analysis Journals doi:10.18535/ijecs/v5i3.05. Rho Seungwoo et al. "Privacy Enhanced Data Security Mechanism In A Large-Scale Distributed Computing System For HTC And MTC". International Journal Of Contents vol 12 no. 2 2016 pp. 6-11. The Korea Contents Association doi:10.5392/ijoc.2016.12.2.006. "Scores - Android Vulnerabilities". Androidvulnerabilities.Org 2017 www.androidvulnerabilities.org Viet Doan Quang and Chang Yeol Choi. "An Efficient Interruption Handling For 3D Games Based On Android Platform". International Journal Of Contents vol 8 no. 4 2012 pp. 42-49. The Korea Contents Association doi:10.5392/ijoc.2012.8.4.042. [...]
Upload Assignment: Assignment - Vulnerability assessment Perform vulnerability assessment of an item or object which is sensitive to you and securing the item or object is very important for you. What is required? Write two pages assessment which includes the following heading: Asset Identification Threat Evaluation Vulnerability Appraisal Risk Assessment Risk Mitigation Please use 10 font size Aerial, 2 pages long document, 1.5 lines spacing, letter size paper, pdf format. If any of these guidelines are not followed then there will be some deduction in marks. The document needs to be submitted online only. Two Points will be deducted for the late submission.