writing service on Mobile Security Computer Science Coursework paper

Research, design and analyse a novel Mobile Secure Backup System that uses Android Smartphones to protect sensitive information.Take the mini-project as an opportunity to explore the existing problems and solutions. The assignment will assess both your understanding of the technology and your ability to apply the knowledge in a meaningful fashion to a specific design problem.

Description:
As in any computing system mobile systems need to be backed up periodically. Since their mobility can generate a security problem for data that need to be backed up, you need to explore possibilities to solve the problem using cryptography in a mobile environment.

Report Assessment Criteria:

Introduction
-Has the topic been justified by showing its importance?
-Has it been followed by a brief introduction into the topic?
-Has the purpose and context of the report been presented?

Research mobile backup solutions
-Have you listed and explained the typical requirements for a mobile backup solution? Use Use Cases to identify them.
-What are typical solutions on the market? Have you compared them using your requirements as criteria? Use a table for it. What are your conclusions regarding the existing solutions? Could you add any additional requirements for your app?
-What are the cryptographic methods used?

Proposed solution
-Has the solution been presented in a concept?
-Did you describe the security concept?
-What are the cryptographic means that will be used? What role do they have?
-How is everything integrated?

Analysis and Discussion
-Have you addressed known security and cryptography issues relevant to this application type? Have you discussed advantages vs. disadvantages in this context?
-Make sure evidence of consideration and understanding of the issue go beyond the mere presentation of information from other sources to reveal opinions on the basis of the background case.

Implementation Aspects
-Have you presented how selected parts of your security concept will be implemented? E.g. you could show how a key is generated or how data in encrypted/decrypted using a certain cryptographic mechanism.
-Make sure you explain the code you use!

Conclusions
-Having presented all of the material, does the report reach clear conclusions?
-Have future tendencies been mentioned?

You must conduct a thorough review of the topic, drawing on a wide range of academically credible sources. You must demonstrate an understanding of the domain, be able to clearly analyse the approaches and draw logical and coherent conclusions. Use as many references as you want but NOT more than 5 years old.

Is this the question you were looking for? If so, place your order here to get started!