Computer Science
King Saud University Authentication Techniques to Protect Customer Data Paper

king saud university

Question Description

I’m stuck on a Computer Science question and need an explanation.

Scenario:

You are the network administrator of a regional bank based in Jeddah. Your team has been faced with hackers intercepting the bank’s website and customers’ mobile application information. You need to develop a strategy using security best practices to protect the customers’ data.

Directions:

Write a paper that includes the following:

A description of the major security concerns for web or mobile application development,

A detailed explanation of the security measures you would incorporate to transmit data, and

Assessment of the security measures needed to be considered and implemented to ensure the proper authentication and authorization.

Keep in mind, we are most interested in your ability to describe the SDLC stages and the steps you would take to enforce security during each stage. Use diagrams, where appropriate.

Deliverables:

Your paper should be 4-5 pages in length, not including the title and reference pages.

You must include a minimum of two credible sources and information from the module to support your writing. Your paper must follow APA style guidelines, as appropriate.

Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

Hi, please see the attached paper. Have a look at it and in case of any edit, please let me know. Otherwise, it is my pleasure to have you as my buddy now and future. Until the next invite, Bye!

Running head: AUTHENTICATION TECHNIQUES

Authentication Techniques
Student’s Name
Institutional Affiliation

1

AUTHENTICATION TECHNIQUES

2

Authentication Techniques
The increase in the use of technological approaches has also led to increased cybercrimes
cases. The cases cannot be ignored since they can be critical to ban the extent of driving to the
downfall of an organization. Resultantly, the software development life cycle entails designing,
developing, and testing the software to ensure it is validated and meets the minimum qualities of
quality software. Working in a bank can offer one experience of how awful hacking can be. The
clients of a bank in Jeddah have been experiencing the challenge of hacking. Hacking can evoke
many inconveniences. In order to protect the clients, the bank should implement the multilevel
security model as the primary approach to authentication.
Description of the Major Security Concerns for Web or Mobile Application
Development
In order to acquire the necessary approach in handling any cyber-attacks and any
inconvenience caused by hackers, the developer should understand the problem itself. As a way
of increasing the efficiency in the banking services, most of the banks have implemented the
mobile banking where the clients do have to rely on visiting the bank premises (Trnka, Cerny, &
Stickney, 2018). Instead, the clients create an account through which they can access essential
services such as withdrawal, transfer, and loan services. The current security is the interception
of the bank’s website and the clients’ mobile application information.
Most of the ban...

DrReginaldWoof (22296)
UT Austin

Anonymous
Top quality work from this tutor! I’ll be back!

Anonymous
It’s my second time using SP and the work has been great back to back :) The one and only resource on the Interwebs for the work that needs to be done!

Anonymous
Thanks, good work

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
Similar Questions
Related Tags