A secure system architecture for a campus ride-sharing
application
Word count: 4719
1
,Contents
Introduction.................................................................................................3
1.0 Three vulnerabilities and 3 threats to an application............................4
1.1 Insecure storage.................................................................................4
1.2 Weak authentication..........................................................................4
1.3 Lack of input validation......................................................................5
2 Personal information associated with the target......................................6
2.1 Leak of health and special needs data...............................................6
2.2 Student finance data leak – financial loss..........................................6
2.3 social blackmail..................................................................................7
3.0 The need of four system security mechanisms and/or controls in this
context in terms of the CIA..........................................................................8
4.0 Architecture design :...........................................................................10
5 Use of OWASP control architecture fortification..................................12
6 Discuss relevant network and operating system vulnerabilities and their
mitigation techniques................................................................................16
6.1 Network – unauthorised access........................................................16
6.2 Malware attacks...............................................................................16
7 Data-at-rest and data-in-transit encryption in application data in cloud
...............................................................................................................17
7.1 Data at rest......................................................................................17
7.2 Data in transit..................................................................................17
8 Utilising Secure DevOps to manage app development and deployment
...............................................................................................................18
9 Protection of users from social engineering and psychological deception
..................................................................................................................18
9.1 psychological deception...................................................................18
9.2 social engineering............................................................................19
10 Innovative technology which helps to fortify application.....................19
Reflection...................................................................................................21
References.................................................................................................23
2
, Introduction
This portfolio report focuses on the aspect of secure system architecture
and how to create a secure system in consideration of the scenario of
deployment a ride sharing application for students to travel from and
around the campus. Different aspects of security of a system are
mentioned along with consideration of; potential threats, threat
mitigations, different theory and methodologies, with the final section of
the report focusing on personal reflection on skill development and
personal progression I’d like to do.
3