BYOD Policy Design for Southern Cross University
Assess the risk from the BYOD policy to the organisation's information system
8 Pages1829 Words264 Views
Added on 2022-11-19
About This Document
This report discusses the risks and modifications required to mitigate the existing BYOD policies for Southern Cross University. It covers the potential vulnerabilities of each threat, certificate-based authentication, comparison with password-based authentication, phishing attacks, and their handling instructions.
BYOD Policy Design for Southern Cross University
Assess the risk from the BYOD policy to the organisation's information system
Added on 2022-11-19
ShareRelated Documents
End of preview
Want to access all the pages? Upload your documents or become a member.
Allowing Employees to Bring Your Own Devices at Work (BYOD Project) at Aztek
|13
|5803
|303
BYOD Policy Threats and Security Strategies for Cybersecurity
|11
|2820
|426
Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guideline
|9
|2240
|285
BYOD Risk Assessment Task 1: Critical Components 2 2 Cyber Security Name of University Author
|15
|2429
|149
Cyber Security Vulnerabilities and Recommendations for ABC Technology
|10
|3323
|1
Cyber Security: Risks and Solutions for South Cross University
|12
|2052
|467