Evaluation of cryptography usage in android application

Institution Jomo Kenyatta University of Science and Technology
Course Information Technol...
Year 3rd Year
Semester Unknown
Posted By Jeff Odhiambo
File Type pdf
Pages 8 Pages
File Size 253.27 KB
Views 1380
Downloads 0
Price: Buy Now whatsapp Buy via whatsapp
  • whatsapp
  • facebook
  • twitter

Description

The evaluation of cryptography usage in Android applications focuses on assessing how effectively cryptographic techniques are implemented to secure sensitive data, such as passwords, personal information, and transaction details. This evaluation includes examining the selection of cryptographic algorithms (e.g., AES, RSA), key management practices, and the proper use of cryptographic libraries such as the Android Keystore system. It also involves identifying potential vulnerabilities such as weak encryption, improper key storage, or insecure data transmission. The goal is to ensure that cryptographic practices align with industry standards and best practices, thereby protecting user data from threats like data breaches, man-in-the-middle attacks, and unauthorized access.
Below is the document preview.

No preview available
HRD 2401/ HCC 2406: ENTREPRENEURSHIP SKILLS LECTURE NOTES
Exposes the student to the nature and meaning of entrepreneurship. The course further seeks to impart the student with knowledge and skills in identifying critical factors essential for entrepreneurship and in creating, starting and managing entrepreneurship venture.
40 Pages 1401 Views 0 Downloads 212.79 KB