Microsoft Word - CMP71001_Assignment_2-S3 2019 CMP71001-Cybersecurity Assignment-2, S3 2019 CMP71001-Cybersecurity Assignment-2, S3 2019 CMP71001-Cybersecurity Assignment-2, S3 2019 School of Business...

1 answer below »

View more »
Answered Same DayJan 27, 2021CMP71001Southern Cross University

Answer To: Microsoft Word - CMP71001_Assignment_2-S3 2019 CMP71001-Cybersecurity Assignment-2, S3 2019...

Neha answered on Feb 02 2021
155 Votes
Student Name:
Student Id:
Contents
Task 1                                    2
BYOD risk assessment                        2
Threats                                 3
Vulnerabilities                            3
Qualitative Risk Assessment                    4
Task 2                                    5
Certificate-Based Authentication                    5
Compare Password based and certificate based            6
Advantages of Certificate-Based                    6
Task 3                                    7
Spam Act 2003                            7
Examples of Spam mail                        9
References                                10
BOYD Risk Assessment
An information system
can be defined as a system which consists of hardware, software, data and people. For the university the people are the students, teachers and other members of university. Data is the most critical and important part of a university. The Southern Cross University uses the password-based authentication system. The university has implemented the Bring Your Own Device (BYOD) policy. According to this policy the users have to bring their own device and can access the information system of university by entering the used id and password. Users will have the right to perform operations on data after entering the correct password. But as we all know that password-based authentication system is not secure. There are many talented hackers who can break the password and enter into the system. As there are many passwords, users may also forget these passwords.
Critical Assets of the information system
1) Software: It is a set of instructions which informs the hardware about the actions need to be performed. But it is a very intangible. Software should not be disturbed. The programmers write the code as lines of instructions which should not be altered [1].
2) Data: This asset is the most important for any organization or university. The university stores data about the students and employees since the day when university started. Data is the base for any case. Data is the most powerful and important tool. If anyone attacks the system then data is the first thing which gets affected. If data gets altered then complete result will be affected.
3) Process: A process can be set of steps which are used to execute any operation. The information system is becoming more integrated with the organizational process. The process helps to get more productivity and better control over the system.
Threats to the assets
1) Software: When everybody will bring their own device to use the university system, then there is no check for the virus the device may contain. If any virus enters the system, it can destroy the software [2]. Worms are also self-replicating by their nature. Bots are the advanced form of worms. They directly enter the system through the internet and they even don’t need the human interaction. Attackers can also drop the spyware in the system via virus and trojans. There are different types of viruses which can enter the system and destroy it.
2) Data: Passwords can be hacked easily by anyone. Others can also look into other person’s system while he is entering the password. Passwords are difficult for anyone as there can be multiple passwords. Passwords are easy to guess and can be shared. As the passwords are saved in the system, if anyone uses other’s system then the password can get leaked. If unauthorized user enters the system then there are chances that he can make the changes or takes the data.
3) Process: If any unauthorised person enters the system then he can either enter the back end of the system. The process is defined by the developer according to which the whole system will work but if even one of the process gets changed or removed then whole system will be hampered.
Potential vulnerabilities
Vulnerability can be defined as the weak point of any asset which will be affected by the threat. In the case of software risk, the most important thing which will get affected by it is the system. The software is the costliest part of an information system and if it gets affected by the risk then the whole system will come to a pause. It is important to keep the software secured and away from all threats. Data is another important aspect of an information system. The database of any organization or university consists data about each and every aspect which is related with it. In the case of university, it has data about the students, employees, subjects, courses, fees structure and many more. The data is the only base using which they can take action on anything. The data decides which course should be taught to the students and which staff members...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here
April
January
February
March
April
May
June
July
August
September
October
November
December
2025
2025
2026
2027
SunMonTueWedThuFriSat
30
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
00:00
00:30
01:00
01:30
02:00
02:30
03:00
03:30
04:00
04:30
05:00
05:30
06:00
06:30
07:00
07:30
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
18:30
19:00
19:30
20:00
20:30
21:00
21:30
22:00
22:30
23:00
23:30