Project 3: Mobile Application Threat Modeling
Step 5: Analyze Mobile Application Threats
You just learned to identify threats and methods of attacks on mobile applications. Now, apply what you have learned by analyzing sample threats using tools in the lab. Identify threat agents and ways they may try to attack your mobile application. Review any previous resource that might help you.
Complete This Lab
Resources
- Accessing the Virtual Lab Environment: Navigating UMGC Virtual Labs and Lab Setup
- Self-Help Guide (Workspace): Getting Started and Troubleshooting
- Link to the Virtual Lab Environment: https://vdi.umgc.edu/
Lab Instructions
Getting Help
To obtain lab assistance, fill out the support request form.
Make sure you fill out the fields on the form as shown below:
- Case Type: UMGC Virtual Labs Support
- Customer Type: Student (Note: faculty should choose Staff/Faculty.)
- SubType: ELM Cyber (CBR/CST/DFC/CYB)
- SubType Detail: Pick the category that best fits the issue you are experiencing.
- Email: Type the email that you currently use for classroom communications.
In the form's description box, provide information about the issue. Add screenshots or supporting documents, and include details such as steps you took and system responses.
After you have analyzed threats, you will review controls in the next step.