Project 3: Mobile Application Threat Modeling
Step 5: Analyze Mobile Application Threats

You just learned to identify threats and methods of attacks on mobile applications. Now, apply what you have learned by analyzing sample threats using tools in the lab. Identify threat agents and ways they may try to attack your mobile application. Review any previous resource that might help you.

Complete This Lab

Resources

Getting Help

To obtain lab assistance, fill out the support request form.

Make sure you fill out the fields on the form as shown below:

  • Case Type: UMGC Virtual Labs Support
  • Customer Type: Student (Note: faculty should choose Staff/Faculty.)
  • SubType: ELM Cyber (CBR/CST/DFC/CYB)
  • SubType Detail: Pick the category that best fits the issue you are experiencing.
  • Email: Type the email that you currently use for classroom communications.

In the form's description box, provide information about the issue. Add screenshots or supporting documents, and include details such as steps you took and system responses.

After you have analyzed threats, you will review controls in the next step.