logo

Assessing Risk from BYOD Policy to University Information System

   

Added on  2023-06-05

14 Pages2624 Words89 Views
1
STUDENT’S NAME
COURSE
INSTITUTION
DATE

2
Executive Summary.
The purpose of this report is to assess the risk from the BYOD policy to the university’s
information system, to identify the most critical component of the university information system,
to write a technical report on the certificate based authentication mechanism and to develop a
guideline of how university students and staff combat the threat of spam.

3
Contents
2.0 Introduction..............................................................................................................................5
3.0Information Asset Classification.............................................................................................6
3.1 Information Asset Valuation..............................................................................................6
3.2 Information Asset Prioritization........................................................................................6
4.0 Certificate based authentication.............................................................................................9
4.1 Advantages of certificate based authentication................................................................9
4.4 Differences between certificate based authentication and password based
authentication...........................................................................................................................10
4.5 Useful features of certificate-based authentication for BYOD policy...........................10
5.0 Spam........................................................................................................................................11
Characteristics of spam..............................................................................................................11
5.1 Types of electronic messages to be treated as spam:......................................................11
5.2 Examples of spam messages..................................................................................................11
Instruction to users on how to handle spam..........................................................................12
Instruction to the IT administrator of how to minimize spam threat................................12
References.....................................................................................................................................13

4
1.0 List of figures.
Fig 1: Weighted Factor Analysis Worksheet.
Fig 2: TVA worksheet.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Risk Assessment of Southern Cross University
|13
|2466
|317

BYOD Policy Threats and Security Strategies for Cybersecurity
|11
|2820
|426

BYOD Risk Assessment Task 1: Critical Components 2 2 Cyber Security Name of University Author
|15
|2429
|149