Description
Answer the attachment with 0 Ai usages because it will result 0
Project
Deadline: Day 30/11/2025 @ 23:59
[Total Mark for this Project is 14 ]
Students Details:
Name:
ID:
CRN:
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Restricted – مقيد
Pg. 01
Project Instructions
Team size
Note: This project is a research group activity. Each group has up to 5
students.
References list must be added for any used materials.
Note:
* Stay within ethical boundaries and respect intellectual property
rights.
* Focus on publicly available information about the app and avoid
exploiting any vulnerabilities.
* Use your critical thinking skills to analyze information and draw
well-supported conclusions.
Copy and paste from any source will lead to zero.
Restricted – مقيد
Pg. 02
Learning
Outcome(s):
CLO2 – Analyze
security threats,
vulnerabilities,
and risks
Question One
7 Marks
Project Goal:
Your goal is to find and analyze a chosen e-Wallet App from Saudi Arabia, and
identify potential security risks and vulnerabilities.
Project Phases:
1. App Selection: (2 marks)
•
•
Choose a reputable e-wallet app from Saudi Arabia.
Justify your selection based on factors like: interfaces, security features, and
available information.
2. Threat Identification: (5 marks)
•
•
Restricted – مقيد
Analyze the e-wallet app architecture, features, and underlying technologies to
identify potential security risks and vulnerabilities.
Search for common e-wallet app attacks and analyze how the chosen app
addresses them (e.g., phishing, malware injection, etc.)
Pg. 03
Learning
Outcome(s):
CLO2 – Analyze
security threats,
vulnerabilities,
and risks.
Question Two
7 Marks
Data Breach in an E-Commerce Company
An e-commerce website suffers a major data breach, exposing thousands of customer
credit card numbers, home addresses, and login credentials. Investigations reveal that
the company did not properly encrypt its database and delayed notifying
customers about the breach.
Background Context: to show you how serious these incidents can be
•
JD Sports (2023): 10 million customers’ personal data exposed.
•
Target (2013): Payment data of 41 million customers compromised.
•
MyFitnessPal by Under Armour (2018): 150 million users affected.
These cases demonstrate the financial, legal, and reputational damage that results when companies
fail to protect customer data.
Group Task:
1. Identify Digital Crimes (2 marks)
Restricted – مقيد
o
Define what types of cyber-crimes took place in this case.
o
Connect your explanation with the real-world examples Like the above.
Pg. 04
2. Company’s Responsibilities (1 marks)
o
Analyze what security duties the company failed to uphold.
o
Discuss obligations such as data encryption, timely breach
notification, and compliance with laws.
3. Proposed Solutions (2 marks)
o
Recommend at least three technical solutions
o
Suggest at least two managerial/policy measures
4. Group Opinion & Debate (2 marks)
o
Restricted – مقيد
Should the company be held legally responsible for customer losses?
Justify your stance with evidence.
Pg. 05
Restricted – مقيد
Purchase answer to see full
attachment