Please give me another solution as first it's wrong please write 1500 word not less I will support you please Case Saudi Arabia is making a rapid progress in implementing computing solutions for facilitating its citizens and residents to use the electronic platforms and various mobile as well as web applications for various services. The users of those applications are required to take appropriate appointment or order for something of their choice while avoiding hustle, fatigue and long waiting hours. But at the same time, it requires addressing various information security related issues like communication security, authentication, privacy. Suppose that your company has won a contract to develop a mobile application for Saudi Arabia called

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question
I need the answer as soon as possible
Please give me another solution as first it's wrong please write 1500 word not less I will
support you please
Case
Saudi Arabia is making a rapid progress in implementing computing solutions for facilitating
its citizens
and residents to use the electronic platforms and various mobile as well as web applications
for various
services. The users of those applications are required to take appropriate appointment or
order for
something of their choice while avoiding hustle, fatigue and long waiting hours. But at the
same time, it
requires addressing various information security related issues like communication security,
authentication, privacy.
Suppose that your company has won a contract to develop a mobile application for Saudi
Arabia called
"All-in-one-app" for providing all study related services in one application. In this case study,
you are
required to identify and judge such issues for your application and list the steps that you will
take to
ensure that you successfully fulfill the following requirements by following the ethical
guidelines that
you learned in corresponding topics in the course:
In about 1500 words answer question you mustn't write less and should provide references
1. Communication channel is secure for secure communication of the data
2. User authentication is secure enough to stop unauthorized login attempts
3. Privacy of users is not compromised
4. All-in-one-app follows the relevant CITC (Communications and Information Technology
Commission) and Saudi NCA (National Cybersecurity Authority) policies
5. Relevant intellectual property rights are not violated
Please note that your answer should keep in view the relevant guidelines and policies of
National
Cybersecurity Authority (NCA) and Communications and Information Technology
Commission (CITC).
Transcribed Image Text:Please give me another solution as first it's wrong please write 1500 word not less I will support you please Case Saudi Arabia is making a rapid progress in implementing computing solutions for facilitating its citizens and residents to use the electronic platforms and various mobile as well as web applications for various services. The users of those applications are required to take appropriate appointment or order for something of their choice while avoiding hustle, fatigue and long waiting hours. But at the same time, it requires addressing various information security related issues like communication security, authentication, privacy. Suppose that your company has won a contract to develop a mobile application for Saudi Arabia called "All-in-one-app" for providing all study related services in one application. In this case study, you are required to identify and judge such issues for your application and list the steps that you will take to ensure that you successfully fulfill the following requirements by following the ethical guidelines that you learned in corresponding topics in the course: In about 1500 words answer question you mustn't write less and should provide references 1. Communication channel is secure for secure communication of the data 2. User authentication is secure enough to stop unauthorized login attempts 3. Privacy of users is not compromised 4. All-in-one-app follows the relevant CITC (Communications and Information Technology Commission) and Saudi NCA (National Cybersecurity Authority) policies 5. Relevant intellectual property rights are not violated Please note that your answer should keep in view the relevant guidelines and policies of National Cybersecurity Authority (NCA) and Communications and Information Technology Commission (CITC).
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY