This report discusses the implementation of BYOD system in a university and the authentication methods used for securing the system. It also explores the risks and vulnerabilities associated with BYOD and provides recommendations for mitigating them. The report covers topics such as critical information assets, certificate-based authentication, password-based authentication, spam, and phishing.