Assessing Risk from BYOD Policy to University Information System
Verified
Added on  2023/06/05
|14
|2624
|89
AI Summary
This report assesses the risk from the BYOD policy to the university’s information system, identifies the most critical component of the university information system, writes a technical report on the certificate based authentication mechanism and develops a guideline of how university students and staff combat the threat of spam.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
1 STUDENT’S NAME COURSE INSTITUTION DATE
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2 Executive Summary. The purpose of this report is to assess the risk from the BYOD policy to the university’s information system, to identify the most critical component of the university information system, to write a technical report on the certificate based authentication mechanism and to develop a guideline of how university students and staff combat the threat of spam.
3 Contents 2.0 Introduction..............................................................................................................................5 3.0Information Asset Classification.............................................................................................6 3.1 Information Asset Valuation..............................................................................................6 3.2 Information Asset Prioritization........................................................................................6 4.0 Certificate based authentication.............................................................................................9 4.1 Advantages of certificate based authentication................................................................9 4.4 Differences between certificate based authentication and password based authentication...........................................................................................................................10 4.5 Useful features of certificate-based authentication for BYOD policy...........................10 5.0 Spam........................................................................................................................................11 Characteristics of spam..............................................................................................................11 5.1 Types of electronic messages to be treated as spam:......................................................11 5.2 Examples of spam messages..................................................................................................11 Instruction to users on how to handle spam..........................................................................12 Instruction to the IT administrator of how to minimize spam threat................................12 References.....................................................................................................................................13
5 2.0 Introduction. Information system is a combination of software, hardware and telecommunications that people build and use to collect, create and distribute useful data, mostly in organizational settings (Elliott 2018)
6 Task 1. 3.0Information Asset Classification. Many organizations use data classification schemes such as internal, public data. Classification of components must be specific to allow determination of private levels. Categories must be mutually exclusive that is to say an asset must belong to only one category (Bello, Murray & Armarego 2017). 3.1 Information Asset Valuation. Coming up with questions will help develop the criteria for valuation of asset. Like which information asset is: 1.Generates the most revenue? 2.Would be more expensive to replace or protect? 3.Is most critical to the organizations success? 3.2 Information Asset Prioritization. Information asset will be prioritized by creating weighting for each category based on the answers to questions. Calculate relative importance of each asset based on weighted factor analysis. List the assets in order of importance using a weighted factor analysis worksheet.
7 From the worksheet consumer order through SSL is the utmost valuable ability based on the weighted sums of the possessions. A BYOD policy is a set of rules that govern an organization’s IT department level of support for employee owned smartphone and tablets. A BYOD policy consists of the preamble which includes the purpose of the policy which highlights the responsibility of the students and the staff. The policy consists of background information regarding BYOD. The policy highlights the objectives and also the scope that is the people it will involve. The BYOD policy consists of the second part which is the actions. This involves the actions of every individual from the students to the staff at the university and some of the actions come with conditions. The BYOD consists of a third part which is the acceptable equipment and communication use only which clarifies the devices that should be brought and some that are prohibited. Under this the policy also states that there will be no plagiarizing of intellectual property and copyright and clearly states the ethical behavior to be complied with by all those users of the devices including the students and the university staff.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
8 A threat vulnerability assets (TVA) combines prioritized lists of assets and threats: List of assets is placed along the x-axis while list of threats is placed along the y-axis with the most dangerous threats at the top. From the worksheet, there is vulnerability of asset 1 against the threat of threat 1. It is clear that the vulnerability of each asset to the threats posed is higher when more devices under BYOD are used to access the university information system which poses a big problem on the security of information in the system.
9 4.0 Certificate based authentication Certificate-based endorsement is the practice of a digital credential to identify a user, appliance, or gadget before allowing access to a resource or a linkage (Kawan et al .2017).In the case of user verification, it is installed in coordination with old-fashioned method of authentication such as keyword authentication (Bratthall & Lindstrom 2018). 4.1 Advantages of certificate based authentication. 1.It is user-friendly – Once the certificate is installed it’s easy to use and furthermost enterprise solutions back certificate-based authentication. 2.It leverages existing admission control policies – This is done to regulate which users can admit different applications plus networks to ensure only lucky users can access crucial operations. 3.Ease of placement and ongoing control – Certificate based solutions emanate through cloud-based management stand to make it tranquil for administrators to subject certificates to new staffs, reintroduce certificates when a worker leaves an organization. Certificates being stored locally not only saves on costs but lifts management pain in revoking or distributing tokens. 4.Mutual authentication – This means both entities involved in messaging are recognizing themselves from a machine to machine or user to user. 5.Extending to outdoor users – Certificates are relaxed to roll out to operators outside of the body plus the ease of use, you will not need to offer extra training. 4.2 Disadvantages of certificate based verification. One of the disadvantages is that certificate based authentication requires public key infrastructure which can increase the cost of initial deployment in some deployment (Hafeez 2018) Another disadvantage is that the system of certificate based authentication is not an infallible one. This is because hackers can target authorities issuing the digital certificate in order to influence certificate data. Consequently, hackers create website or send emails that appear genuine plus cleared certification tests nevertheless are falsified since the certificate authority is compromised (Cho & Ip 2018). 4.3 Working Principle. Certificate based verification can occur on double sides: proof of a host or confirmation of a client. This means that if you need to validate a consumer, the consumer needs to have a document dispensed by a certificate consultant which the host confidences or if you need to authenticate a server the host needs to gain a certificate entitled its hostname and allotted by a credential authority which the client beliefs (Dashti & Radomirovic 2017).
10 4.4 Differences between certificate based authentication and password based authentication. Users are prone to forget their passwords since passwords depend on on a part of the operator which tends to forget when handling security that is the human brain. Password strength might be improved by mandatory rules but those instructions are seen as a drain by the users who tend to forget the correct format of the password that is at least eight characters, at least one uppercase and lowercase letter. Besides, user certificates suggest a storage system which is secure plus is handled well compared with choosing a password (Hammad & Faith 2017) Certificates use asymmetric cryptography which means that the certificate is supplied by a certification authority who assures the link between a physical distinctiveness and a cryptographic public key. The verifier might be a different object that can authenticate a link then use it to confirm the user without receiving the ability to mimic the user in contrast to a password in which whoever authenticates the password recognizes at some point the password. In addition passwords are prone to phishing assaults whereas certificates are not for the reason that of unevenness (Herrera, Ron & Rabadao 2017) Certificates are complex hence they are expensive in that issuing and managing certificates is full of problems and is evidenced by any PKI vendor. PKI is about 5% cryptography and 95% procedures which shows it can be done but not cheaply. Also for user certificates, average users can learn to use client certificates for a HTTPS connection to a website, but at the cost of finding a way to ignore occasional warning popup, which makes them more vulnerable to some attacks. On the other hand, password based authentication is easy to integrate everywhere and does not involve some incompressible extra costs (Kalisiki, Sheth & Shyamsunder 2018). 4.5 Useful features of certificate-based authentication for BYOD policy. 1.Certificatebasedauthenticationpolicyviaanadministratorgeneratesandassigns certificate to devices in the organization via a certificate management portal to an accomplished provision. 2.The bureaucrat aligns his user handbook and network safety systems to trust precise users and devices for validation via bringing in digital credentials of the devices in query 3.By cataloging in, an access application is directed from the gadget to the link. This warrants determined fulfillment that the memorandums sent have been correctly decrypted and the authorizations sound. 4.There is mutual verification to enhance the gadget is attached to the server it anticipates andthe server can also confirm the exact gadget is connecting upon checking, it allows the device access improving security of the data and the network.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
11 5.0 Spam. Spam is known as the sending of unsolicited commercial electronic messages by SMS, email, MMS or instant messaging (Spam Act 2003). Characteristics of spam. 1.Sender anonymity – The sender of the spam messages is always unknown and many senders use IP addresses to further protect their identity. 2.Unsolicited – The recipients never request for spam messages and there is no way to avoid future spam messages and most spam messages are sent with the intention of asking sensitive information. 3.Mass mailing – Spam emails are sent to many at once. 5.1 Types of electronic messages to be treated as spam: 1.A message that offer, advertise or promote goods or services, land or industry or an investment prospect. 2.Market a supplier of merchandises or services or land or a worker of a business or investment prospect. 3.Help or enable a person to falsely obtain property belonging to an additional person. 4.Help or enable a person to falsely obtain a financial benefit or other gain from an extra person. 5.If the information is retrieved via hyperlinks, cell phone numbers or contact data if the communication has a commercial drive (Butcher 2018). 5.2 Examples of spam messages. 1.SMS or electronic message promotion of courting websites and services. This is spam since you never solicited for it. 2.Advance fee, get-rich-fast schemes and betting services. Advance pay is whereby a person asserts to have access to moneys currently held in a bank account besides offering a large amount for assistance comprising providing bank account information or disbursing for administration fee. 3.Offer of stock market alternatives, loan and mortgage arrangements. This is spam since you never requested for it but showed up in your device. 4.Offer of computer goods including software and hardware. This is spam since you did not solicit for it.
12 Instruction to users on how to handle spam. 1.Do not reply to the spam message. This will cause all original addressees to receive the reply causing another flood. 2.Do not respond to instructions to remove me from the mailing list. This will result in a bounced mail message to you. 3.Report the spam. 4.Ensure the junk email filtering is turned on especially if you’re unlucky to receive offensive spam. Instruction to the IT administrator of how to minimize spam threat. 1.Keep the software up to date to make sure you are up to date with the latest antispam software. 2.Enable sender authentication. 3.Implement recipient validation for all domains possible. 4.Learn about email and spam so as to learn the protocols, technology and techniques involved. 5.Enable connection classification (Bacalao et al. 2017).
13 References Bacalao, E.J., Greene, G.J., Beaumont, J.L., Eisenstein, A., Muftic, A., Mandelin, A.M., Cella, D. and Ruderman, E.M., 2017. Standardizing and personalizing the treat to target (T2T) approach for rheumatoid arthritis using the Patient-Reported Outcomes Measurement Information System (PROMIS): baseline findings on patient-centered treatment priorities.Clinical rheumatology,36(8), pp.1729-1736. Bello, A.G., Murray, D. and Armarego, J., 2017. A systematic approach to investigating how information security and privacy can be achieved in BYOD environments.Information & Computer Security,25(4), pp.475-492. Bratthall Tideman, J. and Lindström, J., 2018. Key components when utilising BYOD within organisations-A framework for developing the BYOD policy. Bucher, T., 2018. Cleavage-Control: Stories of Algorithmic Culture and Power in the Case of the YouTube “Reply Girls”. InA Networked Self and Platforms, Stories, Connections(pp. 141-159). Routledge. Cho, V. and Ip, W.H., 2018. A Study of BYOD adoption from the lens of threat and coping appraisal of its security policy.Enterprise Information Systems,12(6), pp.659-673. Dashti, M.T. and Radomirović, S., 2017. An Anti-pattern for Misuse Cases. InComputer Security(pp. 250-261). Springer, Cham. Elliott, J., 2018. Using Mobile Technology for Formative Assessment in the Classroom. InHandbook of Research on Mobile Devices and Smart Gadgets in K-12 Education(pp. 308- 320). IGI Global.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
14 Hafeez, Z.U.N., 2018. An enhanced digital investigation approach for verification of an offence under Pakistan cyber crime law-2016. MCS. Hammad, A. and Faith, P., Visa USA Inc, 2017.Location based authentication. U.S. Patent 9,721,250. Herrera, A.V., Ron, M. and RabadĂŁo, C., 2017, June. National cyber-security policies oriented to BYOD (bring your own device): Systematic review. InInformation Systems and Technologies (CISTI), 2017 12th Iberian Conference on(pp. 1-4). IEEE. Kaliski Jr, B.S., Sheth, S. and Shyamsunder, K., VeriSign Inc, 2018.Integrated dns service provider services using certificate-based authentication. U.S. Patent Application 15/251,497. Kawan, J.C., Chu, R.K.H., Golvin, C. and Tompkins, P., Citicorp Credit Services Inc (USA), 2017.Method and system for controlling certificate based open payment transactions. U.S. Patent 9,607,292.