logo

Cyber Security: Risks and Solutions for South Cross University

You are hired as a cybersecurity consultant to work on a security program for an organization facing cyber threats. Task 1 involves assessing the risk from the Bring Your Own Device (BYOD) policy. Task 2 involves addressing the security concerns of the password-based authentication system.

12 Pages2052 Words467 Views
   

Added on  2022-11-14

About This Document

The report deals with emerging and the contemporary risks of the South Cross University. The organization is using an authentication that is password-based in order to control the entry of the user to the organization’s information system. Th report deals with the implementation of the Bring Your Own Policy (BYOD) policy in the organization and the assessment of risks from the BOYD policy. The report focuses on an authentication that is certificate-based for the devices and the authentication of the users. The report has a detailed discussion about the threats of phishing that the organization is facing and the solutions to mitigate the threats of phishing in the company.

Cyber Security: Risks and Solutions for South Cross University

You are hired as a cybersecurity consultant to work on a security program for an organization facing cyber threats. Task 1 involves assessing the risk from the Bring Your Own Device (BYOD) policy. Task 2 involves addressing the security concerns of the password-based authentication system.

   Added on 2022-11-14

ShareRelated Documents
Running head: CYBER SECURITY
CYBER SECURITY
Name of the Student
Name of the University
Author Note
Cyber Security: Risks and Solutions for South Cross University_1
1CYBER SECURITY
Executive Summary
The report deals with emerging and the contemporary risks of the South Cross University.
The organization is using an authentication that is password-based in order to control the
entry of the user to the organization’s information system. Th report deals with the
implementation of the Bring Your Own Policy (BYOD) policy in the organization and the
assessment of risks from the BOYD policy. The report focuses on an authentication that is
certificate-based for the devices and the authentication of the users. The report has a detailed
discussion about the threats of phishing that the organization is facing and the solutions to
mitigate the threats of phishing in the company.
Cyber Security: Risks and Solutions for South Cross University_2
2CYBER SECURITY
Table of Contents
Introduction:...............................................................................................................................3
Discussions.................................................................................................................................3
BYOD Risk Assessment........................................................................................................3
Certificate-Based Authentication...........................................................................................5
Cybersecurity threats- Phishing.............................................................................................6
Conclusion..................................................................................................................................7
References..................................................................................................................................8
Cyber Security: Risks and Solutions for South Cross University_3
3CYBER SECURITY
Introduction:
The report deals with emerging and the contemporary risks of the South Cross
University. The organization is using an authentication that is password-based in order to
control the entry of the user to the organization’s information system. The report deals with
the implementation of the policy of Bring Your Own Policy (BYOD) in the organization and
the assessment of risks from the BOYD policy. The report focuses on an authentication that is
certificate-based for the devices and the authentication of the users. The report has a detailed
discussion about the threats of phishing that the organization is facing and the solutions to
mitigate the threats of phishing in the company.
Discussions
BYOD Risk Assessment
The organization Southern Cross University uses an authentication that is password-
based in order to control the entry of the user to the organization’s system of information.
Recently, the organization has administered the policy of Bring Your Own Device (BYOD)
and it has raised some issues of security in the company (Bratthall Tideman and Lindström
2018). The security problems of the policy of Bring Your Own Device (BYOD) include:
Leakage of data
The leakage of data becomes a possibility hen the personal devices come into play.
The data that are present can be exposed or get lost when the devices are stolen or misplaced
or if the personal device contains some malware in it (Dhingra 2016). The technology of
cloud has mitigated most of the loss of data due to the damage of the devices, security of
barriers and backups are important to a BYOD program that is healthy.
Lack of management
Cyber Security: Risks and Solutions for South Cross University_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security: BYOD Risk Assessment, Certificate-Based Authentication, and Anti-Phishing Guideline
|12
|2542
|257

Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guideline
|9
|2240
|285

Professional Paper Elements -
|10
|2570
|15

BYOD Risk Assessment Task 1: Critical Components 2 2 Cyber Security Name of University Author
|15
|2429
|149

Cyber Security - Assignment
|14
|3398
|36

BYOD Policy Design for Southern Cross University
|8
|1829
|264