Evaluation of cryptography usage in android application
| Institution | Jomo Kenyatta University of Science and Technology |
| Course | Information Technol... |
| Year | 3rd Year |
| Semester | Unknown |
| Posted By | Jeff Odhiambo |
| File Type | |
| Pages | 8 Pages |
| File Size | 253.27 KB |
| Views | 1380 |
| Downloads | 0 |
| Price: |
Buy Now
|
Description
The evaluation of cryptography usage in Android applications focuses on assessing how effectively cryptographic techniques are implemented to secure sensitive data, such as passwords, personal information, and transaction details. This evaluation includes examining the selection of cryptographic algorithms (e.g., AES, RSA), key management practices, and the proper use of cryptographic libraries such as the Android Keystore system. It also involves identifying potential vulnerabilities such as weak encryption, improper key storage, or insecure data transmission. The goal is to ensure that cryptographic practices align with industry standards and best practices, thereby protecting user data from threats like data breaches, man-in-the-middle attacks, and unauthorized access.
Below is the document preview.
HRD 2401/ HCC 2406: ENTREPRENEURSHIP SKILLS LECTURE NOTES
Exposes the student to the nature and meaning of entrepreneurship. The course further seeks to impart the student with knowledge and skills in identifying critical factors essential for entrepreneurship and in creating, starting and managing entrepreneurship venture.
40 Pages
1401 Views
0 Downloads
212.79 KB