Task Description You are hired by the organisation, such as Southern Cross University, selected in Ass1, as a cybersecurity consultant to work on a security program to address the contemporary and...

1 answer below »

View more »
Answered Same DaySep 08, 2021CMP71001Southern Cross University

Answer To: Task Description You are hired by the organisation, such as Southern Cross University, selected in...

Jayageetha answered on Sep 16 2021
144 Votes
Security consultation report and guideline
Name
ID
Date
Summary
In the era of internet, protecting individual identity has become inevitable for an organization to bring in user integrity. Business entities, universities and other organizations find this task challenging and are coming up with suitable technological and real time solutions. Assessing the r
isks associated with identity thefts and threats is important to find a feasible remedy. The report carries information about knowing such risks, handling them and anti-phishing guidelines
Table of Contents
Introduction
1. BOYD Risk Assessment
1.1 BYOD Risk assessment Introduction
1.2 Objective/Purpose of BYOD Risk assessment
1.3 Scope of Risk Assessment
1.4 Risk assessment approach
1.5 Critical components (Asset Identification) and WFA
1.6 Define risk appetite
1.7 Threats and Vulnerabilities identification and TVA
1.8 Risk Assessment (Qualitative /quantitative)
2. Certificate Based Authentication
2.1 Introduction
2.2 Working principle of Password-based authentication scheme
2.3 Certificate-based authentication scheme
2.3 Working principle of Certificate-based authentication scheme
2.4 Comparison of the username-password and certificate–based Authentication
3. Anti-phishing Guideline
3.1 Definition and characteristics of Phishing
3.2 Representative Examples of Phishing
3.3 Instructions for Phishing Handling (users)
3.4 Instructions for Phishing Handling (IT admin)
4. Conclusion
1. BYOD Risk Assessment
1.1 BYOD Risk assessment Introduction
Password authentication system to access the critical information assets of an organization is largely losing its ground, after the introduction of Bring Your Own Device (BYOD) as it might pose greater threat to the organization’s sensitive information. Understanding the risks in BYOD on par with password authentication system becomes a prerequisite before looking for an alternative. Though importance of BYOD was first understood by Intel in 2009 (Group, 2019), it was only in 2011, the concept became a reality. Later, the it gave way to Bring Your Own Technology (BYOT) and Bring Your Own Software (BYOS), thereby posing security challenges to the inherent information system.
1.2 Objective of BYOD Risk assessment
BYOD gives us the convenience of using our own personal device inside the organization but the threats posed by it outnumber the advantages. Critical information assets are under greater risk. Hence it becomes important to safeguard the vital information with a better technology
1.3 Scope of Risk assessment
Risk assessment in this context, is confined to critical information assets of an organization which may include, access control, personal information ledger, access to academic resources, Copywrites, Intellectual Property rights, Published papers and Patents, vital data, backups, etc.,
1.4 Risk assessment approach
Firstly, the critical information assets in the organization are to be identified and then ordered based on the impact the organization will have, on trespassing. Ordering them using Weighted Factor Analysis (WFA)gives a close to perfect report. Then the assets are to be analysed for threats and vulnerabilities using Threats-Vulnerabilities-Assets worksheet followed by a qualitative or quantitative risk assessment.
1.5 Critical Information Asset Identification and WFA
Weighted Factors Analysis (WFA) is the overall weightage given to a problem (classified into various criteria) based on the impact it has on the business. (ScienceDirect, n.d.). Listing the assets in the order of the most critical one to the least...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here
April
January
February
March
April
May
June
July
August
September
October
November
December
2025
2025
2026
2027
SunMonTueWedThuFriSat
30
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
00:00
00:30
01:00
01:30
02:00
02:30
03:00
03:30
04:00
04:30
05:00
05:30
06:00
06:30
07:00
07:30
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
18:30
19:00
19:30
20:00
20:30
21:00
21:30
22:00
22:30
23:00
23:30