Answer To: This assignment is developmental and cumulative. You are strongly advised to start doing this...
Kuldeep answered on Sep 20 2020
Running head: BYOD Policy
BYOD Policy
BYOD policy
Student Name
University Name
Unit Name
Unit Code
Contents
Introduction 2
Task1 2
Assess the risk from the BYOD policy to the university's information system 2
Task 2 3
Working principle of the Certificate-Based Authentication mechanism 3
Why the university should use the mechanism 4
Task 3 5
References 9
Introduction
As a network security consultant at Southern Cross University, I wrote this report, working on a security program to address the contemporary and emerging risks of cyber threats facing universities. A complete BYOD safety framework includes people, policies, technology, and management should be advanced to address the security issues and make sure that university information systems can deliver the benefits of BYOD.
Task1
Assess the risk from the BYOD policy to the university's information system
Critical components of the university's information system: While BYOD offers a number of benefits; it also presents challenges involving information technology leaders and information security managers. Managing BYOD security, defining the acceptable uses of employees and organizations, and retrieving data from personal devices are key issues in implementing BYOD or the university information system being considered for implementation. Legoland Privacy issues are also required to be strategically addressed to make sure an effective BYOD program, as the BYOD comprises organizing data and protect data that employees reside on their personal devices.
Threats the BYOD policy may bring to the identified critical assets: There are some challenges in adopting BYOD. Adequate security, corporate data protection on the personal devices, privacy/legal issues, and employee compliance with the BYOD strategies are few of challenges to consider. Lack of the comprehensive framework or policy for implementing BYOD further complicates its adoption.
Potential vulnerabilities and risk to the university's information system
Increases risk of data leakage: As universities increasingly rely on the mobile devices, barriers to data leakage as well as threats open up, leading to greater dependence on the IT to protect mobile devices. Tablets and Mobile phones are the weakest link in terms of security and are vulnerable to attacks. They also need to update the patches regularly, and these responsibilities fall into the hands of employees.
Exploits vulnerabilities: CIOs have not as much of control over the mobile devices utilized by universities, which eventually means that they are much vulnerable. The employee is downloading the mobile app and connecting to an exterior Wi-Fi point without the precise security protocol.
Mixing personal and business data: Most obvious BYOD safety challenges are to handle the storing of personal and corporate data on the similar device. Eventually, some kinds of the data will be revealed throughout the university, so the topic of protecting these data needs to be considered.
Task 2
Working principle of the Certificate-Based Authentication mechanism
Certificate-based authentication uses digital certificates to identify users, machines, or devices before granting access to resources, networks, applications, and so on. In the case of user verification, it is usually arranged in a coordinated manner with traditional systems, for example,password and username.
One difference amid certificate-based verification is that unlike some user-only solutions (for example, one-time passwords (OTPs) and biometrics), the similar solution may be utilized for entire endpoints - users, devices, machines and even developing Internet Things (IoT). The Certificate-based verification is very flexible and may be utilized in a variety of ways. There is a common theme of...