Cyber Security - Assignment

   

Added on  2022-08-19

14 Pages3398 Words36 Views
Running head: CYBER SECURITY
CYBER SECURITY
Name of the Student
Name of the University
Author Note
Cyber Security - Assignment_1
1CYBER SECURITY
Executive Summary
Security is one of the important aspects of a Company. The Company should always maintain
security. The report discusses about the Bring Your Device Policy that is very important in
the company so that the employees bring their devices and work in their familiar devices. The
risk assessment of the BYOD is performed in this report. The company should use
authentication that is based on certificate in place of authentication that is based on passwords
so that the company can protect the data properly and minimize the data breach. The report
focuses on the authentication that is based on certificate and the method of the certificate
based authentication. The report also focuses on the anti-spam guidelines that are very
important for the company in order to minimize the overflow of emails in the inbox on the
company or any of the employees. The company should take various steps in order to handle
the email spams.
Cyber Security - Assignment_2
2CYBER SECURITY
Table of Contents
Introduction:...............................................................................................................................3
Task 1: BOYD Risk Assessment...............................................................................................3
Task 2: Certificate-Based Authentication..................................................................................3
Task 3: Anti-Spam Guidelines...................................................................................................3
Conclusions................................................................................................................................3
References..................................................................................................................................4
Cyber Security - Assignment_3
3CYBER SECURITY
Introduction:
New devices’ advanced capabilities, as well as coming of internet with high speed,
has motivated the organizations in using the gadgets in workplace. Bring Your Own Device
(BYOD) is new occurrence where the employees connect the devices with the network of
enterprise in order to gain access to the corporate knowledge as well as carry out functions of
business those are regular. It permits the end users in engaging more in activities related to
work by using smartphones and endpoint devices in way, which is not dependent on
geographical position and time. Thus BYOD brought convenience to the business activities
like work flexibility and efficiency as well as significant advantages. Additionally, cost
efficiency is offe red by BYOD for the organizations, as this does not give devices for the
employees. Hence, number of the organizations taking advantage of productivity benefits for
computing devices is increasing on global scale. Organizations using BYOD in where the
employees who follow policies need to secure BYOD is quite low. The users use BYOD
where they make use of personal devices that are available for organization use.
This paper outlines the risks related with implementation of BYOD in Southern Cross
University. This paper also analyses working principle of mechanism of authentication that is
based on certificate. Spamming and its characteristics are also discussed in this paper as well.
Task 1: BOYD Risk Assessment
Establishing security of BYOD starts with policy creation of BYOD. Strong policy of BYOD
accomplishes many objectives for Southern Cross University. Policy of BYOD must address
the basic considerations like goals of program of BYOD, which employees could bring own
devices, which devices would be supported as well as access levels which the employees are
provided permission while using their personal devices (Zhang, Mouritsen and Miller 2019).
Cloud communication’s rise has paved way for much more organizations in adopting policy
Cyber Security - Assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Professional Paper Elements -
|10
|2570
|15

Risk Assessment of Southern Cross University
|13
|2466
|317

Why is cybersecurity important for the education sector?
|14
|3669
|11

Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guideline
|9
|2240
|285

Cyber Security: BYOD Risk Assessment, Certificate-Based Authentication, and Anti-Phishing Guideline
|12
|2542
|257

BYOD Policy Threats and Security Strategies for Cybersecurity
|11
|2820
|426