100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Essay

Ride sharing application and systems portfolio

Rating
-
Sold
-
Pages
26
Grade
B
Uploaded on
17-09-2025
Written in
2024/2025

This portfolio report focuses on the aspect of secure system architecture and how to create a secure system in consideration of the scenario of deployment a ride sharing application for students to travel from and around the campus. Different aspects of security of a system are mentioned along with consideration of; potential threats, threat mitigations, different theory and methodologies, with the final section of the report focusing on personal reflection on skill development and personal progression I’d like to do.

Show more Read less
Institution
Course










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Unknown
Course

Document information

Uploaded on
September 17, 2025
Number of pages
26
Written in
2024/2025
Type
Essay
Professor(s)
Unknown
Grade
B

Subjects

Content preview

Secure System Architecture Report Portfolio




A secure system architecture for a campus ride-sharing
application



Word count: 4719




1

,Contents
Introduction.................................................................................................3
1.0 Three vulnerabilities and 3 threats to an application............................4
1.1 Insecure storage.................................................................................4
1.2 Weak authentication..........................................................................4
1.3 Lack of input validation......................................................................5
2 Personal information associated with the target......................................6
2.1 Leak of health and special needs data...............................................6
2.2 Student finance data leak – financial loss..........................................6
2.3 social blackmail..................................................................................7
3.0 The need of four system security mechanisms and/or controls in this
context in terms of the CIA..........................................................................8
4.0 Architecture design :...........................................................................10
5 Use of OWASP control architecture fortification..................................12
6 Discuss relevant network and operating system vulnerabilities and their
mitigation techniques................................................................................16
6.1 Network – unauthorised access........................................................16
6.2 Malware attacks...............................................................................16
7 Data-at-rest and data-in-transit encryption in application data in cloud
...............................................................................................................17
7.1 Data at rest......................................................................................17
7.2 Data in transit..................................................................................17
8 Utilising Secure DevOps to manage app development and deployment
...............................................................................................................18
9 Protection of users from social engineering and psychological deception
..................................................................................................................18
9.1 psychological deception...................................................................18
9.2 social engineering............................................................................19
10 Innovative technology which helps to fortify application.....................19
Reflection...................................................................................................21
References.................................................................................................23




2

, Introduction
This portfolio report focuses on the aspect of secure system architecture
and how to create a secure system in consideration of the scenario of
deployment a ride sharing application for students to travel from and
around the campus. Different aspects of security of a system are
mentioned along with consideration of; potential threats, threat
mitigations, different theory and methodologies, with the final section of
the report focusing on personal reflection on skill development and
personal progression I’d like to do.




3
$8.91
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
igornowakowski

Get to know the seller

Seller avatar
igornowakowski University of Winchester
Follow You need to be logged in order to follow users or courses
Sold
New on Stuvia
Member since
2 months
Number of followers
0
Documents
1
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions