Protecting a mobile application has become a necessity, with increased dependence on technology where users allow developers to handle their confidential and personal information. Additionally, threats to cybersecurity pose a challenge, therefore application developers need to make provisions that support the building of applications that are user