logo

COVID 19 Safety Applications and Risks

   

Added on  2023-01-06

33 Pages2384 Words78 Views
 | 
 | 
 | 
Title
COVID 19 safety applications and risks
COVID 19 Safety Applications and Risks_1

Table of content
Introduction
Possible threats and risks to the security of user data
Possible threats to the privacy of a user's data, location
Issues of data sovereignty
Possible security controls
Possible privacy controls
Possible controls to sure that data is under control of Australian
data sovereignty
Conclusion
References
COVID 19 Safety Applications and Risks_2

INTRODUCTION
The power point presentation on analysis of various kinds of control
measures in order to prevent users from different security risks. In
COVID 19 pandemic, the government of various nations is offering
mobile applications to track the cases and protecting public. Due to
these applications, there are a range of possibilities that users might face
different kinds of issues related to security and their privacy. In this
Power point presentation, detailed analysis of different control measures
is mentioned to protect privacy of users of mobile applications.
COVID 19 Safety Applications and Risks_3

Possible threats and risks to the
security of user data
Due to COVID safe applications, there can various kinds of risks and threats to security
of user. This is so because after installation of these applications, users have to add
different kinds of personal information which can be misused by different cyber
hackers. Below some security risks are mentioned which can occur due to COVID safe
application:
Risk of data leakage- This is a key risk that is related of inadvertent data breaches due to
COVID mobile apps.
Risk of network spoofing- Network hacking is when attackers in high-traffic crowded
locations like cafes, library resources and airlines set up fake wireless networks,
conations that stare such as Wi-Fi networks, but are currently hooks.
COVID 19 Safety Applications and Risks_4

CONTINUE
Risk of phishing attack- There are the front lines of many of these
malware attempts, as mobile devices are always driven-on.
Spyware- In the context of COVID 19 safe application, this type of
risk can occur.
Broken Cryptography- Broken cryptography can occur when
application developers of COVID safe app, utilize lackluster data
encryption, or failed to adequately enforce encryption software, as per
the research.
COVID 19 Safety Applications and Risks_5

CONTINUE
Risk of Improper Session Handling- Many applications like
COVID 19 safe apps make use of "coupons" to promote
ease-of-access for smart phone purchases, enabling users to
execute many acts without being asked to identify and
authenticate their identification
Risk of financial accounts- This is also a risk which can be
faced by users due to various kinds of cyber attackers
COVID 19 Safety Applications and Risks_6

CONTINUE
Risk of broken authentication- The identification of
innovative to distort this data is not taken by a remarkable
number of apps and APIs. It's kept unencrypted, quickly
intercepted, in plain text (Kimani, Oduol and Langat,
2019). The material is often immediately decrypted when
recovered, which makes it much easier to copy / paste
outside of the device when combined with insertion flaws.
COVID 19 Safety Applications and Risks_7

Possible threats to the privacy of a
user's data, location
In the context of COVID 19 safe application, there can be certain risks of data of users,
locations and activities. There are various kinds of risks which may occur and some of
them are mentioned below in such manner:
Data privacy and security risk
Mobile Risks and Attacks
Insufficient Transport Layer Protection
Insecure Data Storage
Lack of Binary Protections
Poor Authorization and Authentication
COVID 19 Safety Applications and Risks_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents