logo

Cyber Security: Report on BYOD System and Authentication Methods

   

Added on  2023-04-20

11 Pages1923 Words183 Views
Running Head: CYBER SECURITY 0
Cyber Security
Report
Student name

CYBER SECURITY 1
Table of Contents
Task -1.............................................................................................................................................2
Risk Assessment:.........................................................................................................................4
Task -2.............................................................................................................................................5
Certificate-based Authentication..................................................................................................5
Password-based authentication:...................................................................................................5
Task -3.............................................................................................................................................7
References........................................................................................................................................8

CYBER SECURITY 2
Task -1
University is having different information assets for their business processes. Therefore, they
must know about those assets, which are critical. Critical information assets are required to fulfill
basic needs of university. University is having their Intellectual Property (IP) in their system
(Andrijcic & Horowitz, 2016). However, all those assets should have proper security. Follows
are critical information assets of university:
Compatible devices
License
Cloud storage
Website of university
University Servers
Network monitoring system
Bring Your Own Device (BYOD) system is currently implemented in our university. It means
anyone can take their own device in university premises for different type of works. BYOD
system is providing facility to connect with university internal network for business purposes of
university as well as other works (Arlitsch & Edelman, 2014). It has many advantages as well as
few disadvantages.
These are the advantages of the BYOD system:
Lower cost
Flexibility to bring devices to home
Technological familiarity
It has some disadvantages, which are costs of employees, security and device disparity. It is
depend on the network of the organization. Therefore, it is useful for low-level organization’s
business. Many organizations are having two different types of network that are intranet and
extranet (Barkly, 2018). Local people or devices are connected with the university intranet for
different works. In the extranet, outside people are using that network that has high level of
security. All those critical information assets are connected through internal network. Therefore,

CYBER SECURITY 3
they can be threatened by this policy, as they are having connectivity with the external computer
system and portable devices (Fruhlinger, 2018). In next section, threats of BYOD system to the
critical assets of university will describe.
Threat of BYOD concept to the critical information assets:
1. Computer devices:
Computer systems are connected with the network for different works of university.
Therefore, they should compatible with the present system and technology. If they are
not compatible then they can be affected by the malwares and it will affect whole
system.
2. License
University is allowing their colleagues to download software and other things though
thier network. Therefore, university is responsible for any fault and it is vulnerability
for the university.
3. Cloud storage
University is storing their confidential information at their cloud storage. Therefore, it
is accessible everywhere with proper authorization. However, hackers can get access
through other person’s credentials in the cloud network and storage. Therefore, it is
also vulnerability for the university (Bhagat, 2012).
4. Website of University
Website of university is providing access to different portals that are required high
security, such as fee collection, examination, finance, and many others. If anyone
accesses the website and portals without proper security updates then it is a way for
hackers to data breaches and many things.
5. University Servers
Colleagues and students are accessing different things from university server.
Therefore, it is restricted for the unknown devices to access servers of university for
security purposes.
6. Network Monitoring system
Network infrastructure of university is critical information asset, as it is the most
suitable way to communicate inside the university as well as outside for business

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Risk Assessment of Southern Cross University
|13
|2466
|317

Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guideline
|9
|2240
|285

Network Security: Remote Access, Interconnecting Devices, and WAN Technologies
|9
|1459
|154

BYOD Implementation and Risk Management
|11
|2509
|384

Risk Assessment: BYOD Policy
|14
|4528
|331

Cyber Security Vulnerabilities and Recommendations for ABC Technology
|10
|3323
|1