1 hour 12 minutes
you guessed it. It's time for another quiz, folks, and this one's on the last video building baselines.
So again we'll do three questions. I'll count to three and you'll see the answer. I hope you try to answer it yourself, and you know it's a good way to just engage and make sure that your understanding, all the concepts,
our first question, what is the sixth domain of the mobile app? Security Verification standard. That's the sixth domain,
If you answered environmental interaction requirements, that's correct. Again, that's just one of the eight. You know there are eight domains total on that six. Domain really covers a lot of issues like I PC issues in a ton of others. And really again, if you're looking at these domains,
none of them are more important than one another. They all go together. They're like puzzles there, like a bridge where all those pieces come together and,
you know, together they make a strong access program
for the next question.
Where the categories
in the mobile app sec model
So in general, the categories air out one l two and are but what I really want you to think of is there's out one. There's l two
l one plus r l two plus are so he did l one l two r. That's technically correct, but really, you have to think of it as there's four different categories your app can fall in and those air the way you should be thinking about when you're trying to kind of get into this modeling the risk of your mobile app threat modelling it.
And for this last question, what category would a hospital communication app fall under in the mobile app SEC model
All right, So if you were paying attention during our modeling discussion of using that mobile APP SEC novel, applying certain types of APS to it, you would have probably felt to yourself well, this app handles really sensitive data because it's a hospital lap and then he would have thought, Well, it's a communication app, so it does have a lot of interesting scenarios that it could be used.
So what really comes down to what's interesting
from a testing point of view is not only having defense in depth because we want to make sure that we're applying, you know, security practices that are gonna be in line with compliance and other regulatory bodies. But we want reverse engineering resilience because this is a communication at this could be a messaging app, you know, in app that really has
interesting things that go into using it. So if you did follow along those and you kind of made sense of them great. And, you know, if you didn't get this one, it's okay here. You keep practicing, think about the APS that you're using on a day to day basis and time to think. What's the threat model? This app. How is it applied to the enterprise that's actually making it?
I hope this quiz was useful and I hope to see in the next video. Thank you.
Android Development Fundamentals
Android users dominate the mobile market, so the demand for Android developers is high. This ...
4 CEU/CPE Hours Available
Certificate of Completion Offered
Manage a Web App
In this IT Pro Challenge virtual lab, you will get hands-on experience using the Azure ...
Learn On Demand