mobile application 2

  

1. Mobile app security and vulnerabilities are increasing appearing in the media headlines. Discuss the current state of mobile app security and what steps can be introduced to improve the situation within the Mobile App Development process, the mobile platforms and within the app-store-ecosystem.

 

Discussion

 Describe three authentication types and give an example of each.

It should be at least 350 words. 

Iot Security Risks

Around 400 words essay about security risks of Internet of Things. Need to include 3 academic scholar journal sources: 1 main source representing the topic and 2 supporting sources.

4 paragraphs:

– Introduction to the topic

– author view of the main source: discuss and analyze the topic

– discuss the 2 remaining sources to support the previous point

– conclusion

No formatting required. PLAGIARISM FREE is a must.

2 Discussions

Discussion 1.2

Due: Initial Post due Friday, Replies due Sunday

Discuss the needs for GIS. 

Discussion 2.1

Due: Initial Post due Friday, Replies due Sunday

How is GIS used in public health?