Certificate Based Authentication Mechanism PDF

Added on - Dec 2020

Trusted by 2+ million users,
1000+ happy students everyday
Showing pages 1 to 3 of 7 pages
CYBERSECURITY
TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................1
TASK 1............................................................................................................................................1
Assessment of risk from Bring Your Own Device (BOYD) policy to university's information
system..........................................................................................................................................1
TASK 2............................................................................................................................................2
Working principle of the Certificate Based Authentication mechanism....................................2
TASK 3............................................................................................................................................3
Top Cybersecurity Threats and Anti-Spam.................................................................................3
CONCLUSION................................................................................................................................3
REFERENCES................................................................................................................................4
INTRODUCTION
Cybersecurity is one of the greatest challenges among all the internet users across world.
It is considered as the protection in which systems are protected against the unauthorised users.
This report will describe alteration of cyber policies by applying more secured authentications.
Study will also provide some measures for protecting systems from spamming activities. It will
include the risk assessment threats involved in cybercrimes as well.
TASK 1
Assessment of risk from Bring Your Own Device (BOYD) policy to university's information
system
Cybersecurity is a major area of concern which greatly influences the functioning of all
commercial enterprises. The university deals with a large amount of confidential data on a
regular basis. So, management of college need to focus towards the security concerns of this
huge information. Being a consultant of Southern Cross University, one has to be familiar with
the working policiesof university (Dua and Du, 2016).
Critical components of university's information system are considered as tools and
practices which are required in identifying the threats of cybersecurity. Such components include
thephysicalsecurityofinformationassetsthatsupportnationalandeconomicdata.A
vulnerability assessment is used to identify the problems which may be responsible for exposure
of information and predicting the measures which prevent resources from attacks.
Since this entity uses password authentication security so, management has realised that
it is not an effective method to restrict unauthorised user to access information. This university is
using BYOD policy to protect the data from criminals. But recently, it was found that this policy
has raised great concerns for maintaining secured data. So, as a technical advisor of the college,
one has advised management to change this security policy with certificate based authentication
mechanism.
Change in the technological policies of this campus requires critical analysis in which
consultant has to implement strong plans to protect university from huge fraudulent activities
(Singer & Friedman, 2014). In recent days, password authentication system is proved to be
ineffective cybersecurity plan as it was found that information is accessible by many users and
1
Desklib Logo
You are reading a preview
Upload your documents to download or

Become a Desklib member to get access