SlideShare a Scribd company logo
Mobile App Part 1. 15
Project summary
Project requirements
This project will have several requirements for its development.
Functional requirements
A user should be able to use the mobile application to be
developed.
Each user using the mobile application should be uniquely
identified using the registration details.
The system should have a wide scope across several mobile
operating system platforms.
Non-functional requirements
i. Ease of use
The mobile application should be easy to use by all users
ii. Reliability
The mobile application should have minimum rate of failure
iii. Portability
The mobile application should operate in various and be
integrated in various platforms.
iv. Security
Any user data sent, should be encrypted
v. Size.
The mobile application should occupy less server and mobile
space.Budget
Desktop
$250
Smartphone
$400
Transport
$60
Flash Drive 2GB
$20
Printer
$80
Internet subscription
$50
SMS gateway subscription
$60
Miscellaneous
$80
Total
$1000
Human resources
Three programmers
One database developer
Workload
Person
Task
All programmers
Analysis, design
Two programmers
coding
One programmer
Testing and debugging
Database developer
Design and develop database
Work breakdown structure is a hierarchical and an incremental
decomposition of a given project into deliverables, phases and
work packages. It is a tree structure, which shows a subdivision
of effort required to achieve an objective.
The methodology behind the construction of WBS is the system
analysis, system design, and system development. The WBS
helps in analyzing the system and the project.
References
Haugan, G. T. (2002). Effective work breakdown structures.
Vienna, Va: Management Concepts.
Harris, P. E. (2007). Planning and control using Microsoft
Project and PMBOK® guide: Updated for Microsoft Office
Project 2007. Victoria, Australia: Eastwood Harris Pty. Ltd.
Harris, P. E. (1999). Planning and control using Microsoft®
Project 2010 and PMBOK guide® fourth edition. Victoria,
Australia: Eastwood Harris.
Norman, E. S., Brotherton, S. A., & Fried, R. T. (2008). Work
breakdown structures: The foundation for project management
excellence. Hoboken, N.J: John Wiley & Sons.
Comparison between the Gantt chart and PERT
PERT (program evaluation and review technique) is one of the
statistical tool that is used in project management to analyze
and represent the tasks involved in the completion of a given
project while a Gantt chart is a horizontal tabular bar chart
which shows the project schedule that is it shows the start and
finish dates of the terminal elements of the project and summary
elements of a project.
The Gantt chart may be used in status reporting to show and
present how much of the plan has been completed by displaying
and showing the progress of an activity.
The information received from a Gantt chart is more helpful
because, the information in a Gantt chart is graphical hence
easily understood than in the PERT which just shows arrows
and nodes.
It is easier to draw and present the information in a Gantt chart
and be used in the analysis of the project because it shows both
the estimated and actual time the project takes compared to the
PERT which only shows the earliest start time and Latest end
time of an activity.
Gantt charts are simple and easy to read while PERT may not be
easily understood.
The PERT provides useful information since it can show the
critical path and the critical activities hence helpful in planning
the resources of the project compared to the Gantt chart which
only shows the activity duration and the predecessors.
When using the PERT, it shows the information on the activities
and shows the slack activities and when to start and end in case
of a dummy activity.
Application of Gantt charts and PERTS
Gantt charts are used when planning for small projects while
PERT can be used when planning for large projects. This is
because many interlinking activities are difficult to represent in
the Gantt chart and also the duration may be large to be
represented.
Importance of Critical path
i. It will display all the activities of the project and it will help
to plan on how to do the activities such that the slack activities
can be started either earlier or late.
ii. It can help to reschedule the resources of noncritical
activities to the critical activities hence accelerating the project
activities.
iii. The critical path can be used to calculate the standard
deviation of the project and the covariance to know how
correlated the activities in the project are.
iv. The critical path is what determines the duration of the
project since it shows the activities that shows takes the longest
duration between the start and the end of the project.
Gantt chart
References:
Barkley, B. (2008). Project management in new product
development. New York: McGraw-Hill.
Shelly, G. B., & Rosenblatt, H. J. (2012). Systems analysis and
design. Boston: Course Technology Cengage Learning.
Gantt and Pert charts is the main core mobile app essential
components very crucial when handling the project, it enhances
effective analysis, communication and visualization of a carried
out project. Risk is the main core limitation of this mobile app
as it can be very vulnerable to high levels of misuse.
Functionality and vulnerabilities are type mainly evident core
scope of risk according to this context.
1. Activity monitoring
2. Unauthorized dialing
3. Unauthorized network connectivity
4. UI impersonation
5. System modification
6. Logic
7. Data leakage
8. Unsafe data storage
9. Unsafe data transmission
10. Hardcoded password
Inherent schedule flaws and requirement inflations are the top
most risk each projects is ultimately exposed and subjected to.
Sending of messages, microphone recording and data storage
are the main ultimate likelihood assessment aspects of risk
ascertained under the activity monitoring risk. Technical risk is
the most appropriate impact based on the approach as
continuous changing requirement affects the timeline of the
projects accomplishment. Customers and suppliers are the main
ideal owners of the risk for need trackers. Project initiation and
project planning is the main proper methodology to control the
monitoring activity risk (Gunasekera, 2012).
Mobile payment and SMS spread rate is the main assessed
authorized dialing risk encountered under this approach. Change
in premiums and payment rates impacts on the nature of parties’
terms and conditions prompting toll fraud crime. The company
and consumers are the main appropriate owners of authorized
dialing and payment risk. Project monitoring and control is the
main ultimate strategic approach through which performances
and changes can be managed ultimately (Brown et-al, 2013).
Spyware is one of the main fundamental likelihood to
unauthorized network connectivity risk. Attacker’s benefits
through this approach send data; it is very cognizant for the
organization and customers who are the main ultimate owners to
initiate the implementation security measures strategies (Brown
et-al, 2013).
Malicious app and phishing attacks are the main UI
impersonation risk assessed. UI legitimacy is the main core
scope through which victims should be very clear and concise
over authenticity of the information and end issues with the
attackers. Proxy and bank app are the main ultimate owners,
initiation plan project strategy is the most viable approach
through which this menaces can be managed (Gunasekera,
2012).
Malicious application and configuration changes are the main
likelihood of system modification risk. Configuration changes
enhance the possibilities of attack and thus rootkit and APN
proxy are the main core owners. Planning, execution and
monitoring and control project are the main appropriate
strategic mechanism through which configuration changes and
malicious attacks can be handled significantly (Bergman et-al,
2013).
Malicious activity is one of is the ultimate assessed logic risk.
Classic technique can influences occurrences of suspicious and
malicious activity which compromise the confidentiality of the
message or data. Project monitoring and control are the
appropriate strategic mechanism through which risk mitigation
based on this level can be ascertained.
Inadvertent and legitimate apps can definitely enhances
sensitive data leakage risk. Confidential information can leak to
third party causing harmful effect to the victim as the attackers
can definitely expose. Phones and customers are the main
ultimate viable owners. Implementation of security tracking
measures is the main project execution strategic approach
through which this vice can be controlled (Hartley & Wong,
2015).
Mobile apps should definitely store data in an encrypted form;
failure to conceptualization of the viable aspect enhances unsafe
sensitive data storage risk. Pin numbers and passwords are the
main ultimate mechanism through sensitive data can be secured
from attackers. Banks and online users are the main owners and
therefore the main strategic approach to ascertain this issue is
through project monitoring and control.
Wireless communication is commonly known for higher
insecurity to data transmission risk. Mobile devices are the
main owners and thus it is very significant to that sensitive data
is perfectly encrypted in order to safeguard the data. Invalid
certificates should be ascertained appropriately in order to
fundamentally control and manage the issue (Hartley & Wong,
2015).
Additionally, password ineffective is the main likelihood assess
to hardcoded password risk. MasterCard is the main owner and
thus it is very crucial and necessary beware of reverse
engineering which can absolutely compromise the security and
authenticity of the information and data. Project monitoring and
control is the top most strategic approach through which issue
can ascertained extensively (Gonzalez, 2015).
References
Bergman, N., Stanfield, M., Rouse, J., & Scambray, J. (2013).
Hacking exposed: Mobile security secrets & solutions.
Brown, P., Roth, M. S., & Practising Law Institute,. (2013).
Information technology law institute, 2013: Privacy and
cybersecurity, mobile advertising, digital distribution, social
media and the third industrial revolution.
Gonzalez, D. (2015). Managing online risk: Apps, mobile, and
social media security.
Gunasekera, S. (2012). Android Apps Security. Dordrecht:
Springer.
Hartley, C. P., & Wong, P. (2015). The caregiver's toolbox:
Checklists, forms, resources, mobile apps, and straight talk to
help you provide compassionate care.
Mobile App Part 1.15Project summaryProject requirements.docx

More Related Content

DOCX
Running head APPLICATIONS RELATIVE TO COURSE OBJECTIVES .docx
PDF
31 ijaprr vol1-4-29-35harmeet
PPTX
Project Time Managment.pptx
DOCX
4Implementing a New Wi-Fi in XYZ AirportExecutive SummaryThi.docx
PDF
IRJET - Labtrust-Android Application for Pathology Laboratory
PDF
How software size influence productivity and project duration
PPTX
Messaging_and_Chat_Application_PPT_1.pptx
PPTX
Messaging_and_Chat_Application_PPT_1.pptx
Running head APPLICATIONS RELATIVE TO COURSE OBJECTIVES .docx
31 ijaprr vol1-4-29-35harmeet
Project Time Managment.pptx
4Implementing a New Wi-Fi in XYZ AirportExecutive SummaryThi.docx
IRJET - Labtrust-Android Application for Pathology Laboratory
How software size influence productivity and project duration
Messaging_and_Chat_Application_PPT_1.pptx
Messaging_and_Chat_Application_PPT_1.pptx

Similar to Mobile App Part 1.15Project summaryProject requirements.docx (20)

PDF
CRIME EXPLORATION AND FORECAST
PDF
Insights on Research Techniques towards Cost Estimation in Software Design
PDF
SOFTWARE COST ESTIMATION USING FUZZY NUMBER AND PARTICLE SWARM OPTIMIZATION
PDF
Real-Time Reporting: A Game-Changer in Construction Management
PDF
Mobile app development in construction industry
PDF
Effort Estimation Development Model for Web-based Mobile Application Using Fu...
PDF
IRJET- Trend Analysis on Twitter
PDF
IRJET- Road Accident Prediction using Machine Learning Algorithm
PDF
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...
PDF
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
PDF
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
PPT
105 project time management
DOCX
Final Project Report on Information Systems Project Management
DOCX
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
PDF
Software Metrics for Identifying Software Size in Software Development Projects
PPTX
Iwsm2014 an analogy-based effort estimation approach for mobile application...
PDF
Secured Scheduling Technique of Network Resource Management in Vehicular Comm...
DOCX
Business Case Capstone IIConnie FarrisColorado T.docx
DOCX
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
PDF
project management
CRIME EXPLORATION AND FORECAST
Insights on Research Techniques towards Cost Estimation in Software Design
SOFTWARE COST ESTIMATION USING FUZZY NUMBER AND PARTICLE SWARM OPTIMIZATION
Real-Time Reporting: A Game-Changer in Construction Management
Mobile app development in construction industry
Effort Estimation Development Model for Web-based Mobile Application Using Fu...
IRJET- Trend Analysis on Twitter
IRJET- Road Accident Prediction using Machine Learning Algorithm
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
105 project time management
Final Project Report on Information Systems Project Management
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
Software Metrics for Identifying Software Size in Software Development Projects
Iwsm2014 an analogy-based effort estimation approach for mobile application...
Secured Scheduling Technique of Network Resource Management in Vehicular Comm...
Business Case Capstone IIConnie FarrisColorado T.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
project management
Ad

More from annandleola (20)

DOCX
CASE 6B – CHESTER & WAYNE Chester & Wayne is a regional .docx
DOCX
CASE 9 Bulimia Nervosa Table 9-1   Dx Checklist   Bulimia Nervos.docx
DOCX
Case 9 Bulimia Nervosa in Gorenstein and Comer (2014)Rita was a.docx
DOCX
Case 8.1 Pros and Cons of Balkan Intervention59Must the a.docx
DOCX
CASE 5Business Performance Evaluation Approaches for Thoughtf.docx
DOCX
Case 6-2 Not Getting Face Time at Facebook—and Getting the Last La.docx
DOCX
Case 6.4 The Case of the Poorly Performing SalespersonEd Markham.docx
DOCX
Case 5.6Kelo v City of New London545 U.S. 469 (2005)Ye.docx
DOCX
CASE 5.10 FIBREBOARD PAPER PRODUCTS CORP. V. NLRB SUPREME COURT OF.docx
DOCX
Case 4 The McDonald’s China Food Supplier Scandal1. What we.docx
DOCX
Case 3 Neesha Wilson Phoenix Rising Risks, Protective Factors, and.docx
DOCX
Case 48 Sun Microsystems Done by Nour Abdulaziz Maryam .docx
DOCX
CASE 42 Myasthenia Gravis The immune response turns agai.docx
DOCX
Case 4 JetBlue Delighting Customers Through Happy JettingIn the.docx
DOCX
Case 4-2 Hardee TransportationThe Assignment Answer the four .docx
DOCX
Case 3-8 Accountant takes on Halliburton and Wins!1.      Descri.docx
DOCX
CASE 3.2 A Shift for Lieutenant Colonel AdamsEAM 751 Chapter.docx
DOCX
Case 3 Ford’s Pinto Fires The Retrospective View of Ford’s Fiel.docx
DOCX
Case 3Competition in the Craft Brewing Industry in 2017John D. Var.docx
DOCX
CASE 3.2 Ethics, Schmethics-Enrons Code of EthicsIn Jul.docx
CASE 6B – CHESTER & WAYNE Chester & Wayne is a regional .docx
CASE 9 Bulimia Nervosa Table 9-1   Dx Checklist   Bulimia Nervos.docx
Case 9 Bulimia Nervosa in Gorenstein and Comer (2014)Rita was a.docx
Case 8.1 Pros and Cons of Balkan Intervention59Must the a.docx
CASE 5Business Performance Evaluation Approaches for Thoughtf.docx
Case 6-2 Not Getting Face Time at Facebook—and Getting the Last La.docx
Case 6.4 The Case of the Poorly Performing SalespersonEd Markham.docx
Case 5.6Kelo v City of New London545 U.S. 469 (2005)Ye.docx
CASE 5.10 FIBREBOARD PAPER PRODUCTS CORP. V. NLRB SUPREME COURT OF.docx
Case 4 The McDonald’s China Food Supplier Scandal1. What we.docx
Case 3 Neesha Wilson Phoenix Rising Risks, Protective Factors, and.docx
Case 48 Sun Microsystems Done by Nour Abdulaziz Maryam .docx
CASE 42 Myasthenia Gravis The immune response turns agai.docx
Case 4 JetBlue Delighting Customers Through Happy JettingIn the.docx
Case 4-2 Hardee TransportationThe Assignment Answer the four .docx
Case 3-8 Accountant takes on Halliburton and Wins!1.      Descri.docx
CASE 3.2 A Shift for Lieutenant Colonel AdamsEAM 751 Chapter.docx
Case 3 Ford’s Pinto Fires The Retrospective View of Ford’s Fiel.docx
Case 3Competition in the Craft Brewing Industry in 2017John D. Var.docx
CASE 3.2 Ethics, Schmethics-Enrons Code of EthicsIn Jul.docx
Ad

Recently uploaded (20)

PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
Computing-Curriculum for Schools in Ghana
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PDF
IGGE1 Understanding the Self1234567891011
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
Cell Types and Its function , kingdom of life
PPTX
Lesson notes of climatology university.
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
advance database management system book.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
1_English_Language_Set_2.pdf probationary
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Hazard Identification & Risk Assessment .pdf
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Computing-Curriculum for Schools in Ghana
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
IGGE1 Understanding the Self1234567891011
Complications of Minimal Access Surgery at WLH
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Cell Types and Its function , kingdom of life
Lesson notes of climatology university.
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Final Presentation General Medicine 03-08-2024.pptx
advance database management system book.pdf
Final Presentation General Medicine 03-08-2024.pptx
Paper A Mock Exam 9_ Attempt review.pdf.
1_English_Language_Set_2.pdf probationary
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx

Mobile App Part 1.15Project summaryProject requirements.docx

  • 1. Mobile App Part 1. 15 Project summary Project requirements This project will have several requirements for its development. Functional requirements A user should be able to use the mobile application to be developed. Each user using the mobile application should be uniquely identified using the registration details. The system should have a wide scope across several mobile operating system platforms. Non-functional requirements i. Ease of use The mobile application should be easy to use by all users ii. Reliability The mobile application should have minimum rate of failure iii. Portability The mobile application should operate in various and be integrated in various platforms. iv. Security Any user data sent, should be encrypted v. Size. The mobile application should occupy less server and mobile space.Budget Desktop $250 Smartphone $400 Transport $60 Flash Drive 2GB $20
  • 2. Printer $80 Internet subscription $50 SMS gateway subscription $60 Miscellaneous $80 Total $1000 Human resources Three programmers One database developer Workload Person Task All programmers Analysis, design Two programmers coding One programmer Testing and debugging Database developer Design and develop database Work breakdown structure is a hierarchical and an incremental decomposition of a given project into deliverables, phases and work packages. It is a tree structure, which shows a subdivision of effort required to achieve an objective. The methodology behind the construction of WBS is the system analysis, system design, and system development. The WBS helps in analyzing the system and the project.
  • 3. References Haugan, G. T. (2002). Effective work breakdown structures. Vienna, Va: Management Concepts. Harris, P. E. (2007). Planning and control using Microsoft Project and PMBOK® guide: Updated for Microsoft Office Project 2007. Victoria, Australia: Eastwood Harris Pty. Ltd. Harris, P. E. (1999). Planning and control using Microsoft® Project 2010 and PMBOK guide® fourth edition. Victoria, Australia: Eastwood Harris. Norman, E. S., Brotherton, S. A., & Fried, R. T. (2008). Work breakdown structures: The foundation for project management excellence. Hoboken, N.J: John Wiley & Sons. Comparison between the Gantt chart and PERT PERT (program evaluation and review technique) is one of the statistical tool that is used in project management to analyze
  • 4. and represent the tasks involved in the completion of a given project while a Gantt chart is a horizontal tabular bar chart which shows the project schedule that is it shows the start and finish dates of the terminal elements of the project and summary elements of a project. The Gantt chart may be used in status reporting to show and present how much of the plan has been completed by displaying and showing the progress of an activity. The information received from a Gantt chart is more helpful because, the information in a Gantt chart is graphical hence easily understood than in the PERT which just shows arrows and nodes. It is easier to draw and present the information in a Gantt chart and be used in the analysis of the project because it shows both the estimated and actual time the project takes compared to the PERT which only shows the earliest start time and Latest end time of an activity. Gantt charts are simple and easy to read while PERT may not be easily understood. The PERT provides useful information since it can show the critical path and the critical activities hence helpful in planning the resources of the project compared to the Gantt chart which only shows the activity duration and the predecessors. When using the PERT, it shows the information on the activities and shows the slack activities and when to start and end in case of a dummy activity. Application of Gantt charts and PERTS Gantt charts are used when planning for small projects while PERT can be used when planning for large projects. This is because many interlinking activities are difficult to represent in the Gantt chart and also the duration may be large to be represented. Importance of Critical path
  • 5. i. It will display all the activities of the project and it will help to plan on how to do the activities such that the slack activities can be started either earlier or late. ii. It can help to reschedule the resources of noncritical activities to the critical activities hence accelerating the project activities. iii. The critical path can be used to calculate the standard deviation of the project and the covariance to know how correlated the activities in the project are. iv. The critical path is what determines the duration of the project since it shows the activities that shows takes the longest duration between the start and the end of the project. Gantt chart References: Barkley, B. (2008). Project management in new product development. New York: McGraw-Hill. Shelly, G. B., & Rosenblatt, H. J. (2012). Systems analysis and design. Boston: Course Technology Cengage Learning. Gantt and Pert charts is the main core mobile app essential components very crucial when handling the project, it enhances effective analysis, communication and visualization of a carried out project. Risk is the main core limitation of this mobile app as it can be very vulnerable to high levels of misuse.
  • 6. Functionality and vulnerabilities are type mainly evident core scope of risk according to this context. 1. Activity monitoring 2. Unauthorized dialing 3. Unauthorized network connectivity 4. UI impersonation 5. System modification 6. Logic 7. Data leakage 8. Unsafe data storage 9. Unsafe data transmission 10. Hardcoded password Inherent schedule flaws and requirement inflations are the top most risk each projects is ultimately exposed and subjected to. Sending of messages, microphone recording and data storage are the main ultimate likelihood assessment aspects of risk ascertained under the activity monitoring risk. Technical risk is the most appropriate impact based on the approach as continuous changing requirement affects the timeline of the projects accomplishment. Customers and suppliers are the main ideal owners of the risk for need trackers. Project initiation and project planning is the main proper methodology to control the monitoring activity risk (Gunasekera, 2012). Mobile payment and SMS spread rate is the main assessed authorized dialing risk encountered under this approach. Change in premiums and payment rates impacts on the nature of parties’ terms and conditions prompting toll fraud crime. The company and consumers are the main appropriate owners of authorized dialing and payment risk. Project monitoring and control is the main ultimate strategic approach through which performances and changes can be managed ultimately (Brown et-al, 2013). Spyware is one of the main fundamental likelihood to unauthorized network connectivity risk. Attacker’s benefits through this approach send data; it is very cognizant for the organization and customers who are the main ultimate owners to initiate the implementation security measures strategies (Brown
  • 7. et-al, 2013). Malicious app and phishing attacks are the main UI impersonation risk assessed. UI legitimacy is the main core scope through which victims should be very clear and concise over authenticity of the information and end issues with the attackers. Proxy and bank app are the main ultimate owners, initiation plan project strategy is the most viable approach through which this menaces can be managed (Gunasekera, 2012). Malicious application and configuration changes are the main likelihood of system modification risk. Configuration changes enhance the possibilities of attack and thus rootkit and APN proxy are the main core owners. Planning, execution and monitoring and control project are the main appropriate strategic mechanism through which configuration changes and malicious attacks can be handled significantly (Bergman et-al, 2013). Malicious activity is one of is the ultimate assessed logic risk. Classic technique can influences occurrences of suspicious and malicious activity which compromise the confidentiality of the message or data. Project monitoring and control are the appropriate strategic mechanism through which risk mitigation based on this level can be ascertained. Inadvertent and legitimate apps can definitely enhances sensitive data leakage risk. Confidential information can leak to third party causing harmful effect to the victim as the attackers can definitely expose. Phones and customers are the main ultimate viable owners. Implementation of security tracking measures is the main project execution strategic approach through which this vice can be controlled (Hartley & Wong, 2015). Mobile apps should definitely store data in an encrypted form; failure to conceptualization of the viable aspect enhances unsafe sensitive data storage risk. Pin numbers and passwords are the main ultimate mechanism through sensitive data can be secured from attackers. Banks and online users are the main owners and
  • 8. therefore the main strategic approach to ascertain this issue is through project monitoring and control. Wireless communication is commonly known for higher insecurity to data transmission risk. Mobile devices are the main owners and thus it is very significant to that sensitive data is perfectly encrypted in order to safeguard the data. Invalid certificates should be ascertained appropriately in order to fundamentally control and manage the issue (Hartley & Wong, 2015). Additionally, password ineffective is the main likelihood assess to hardcoded password risk. MasterCard is the main owner and thus it is very crucial and necessary beware of reverse engineering which can absolutely compromise the security and authenticity of the information and data. Project monitoring and control is the top most strategic approach through which issue can ascertained extensively (Gonzalez, 2015). References Bergman, N., Stanfield, M., Rouse, J., & Scambray, J. (2013). Hacking exposed: Mobile security secrets & solutions. Brown, P., Roth, M. S., & Practising Law Institute,. (2013). Information technology law institute, 2013: Privacy and cybersecurity, mobile advertising, digital distribution, social media and the third industrial revolution. Gonzalez, D. (2015). Managing online risk: Apps, mobile, and social media security. Gunasekera, S. (2012). Android Apps Security. Dordrecht: Springer. Hartley, C. P., & Wong, P. (2015). The caregiver's toolbox: Checklists, forms, resources, mobile apps, and straight talk to help you provide compassionate care.