Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guideline
Assess the risk from the BYOD policy to the organization's information system
9 Pages2240 Words285 Views
Added on 2023-04-25
About This Document
This report discusses the risks associated with BYOD policy and suggests adopting certificate-based authentication and anti-phishing guidelines to enhance the security of Southern Cross University data. It includes a BOYD risk assessment, certificate-based authentication, and anti-phishing guideline.
Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guideline
Assess the risk from the BYOD policy to the organization's information system
Added on 2023-04-25
ShareRelated Documents
End of preview
Want to access all the pages? Upload your documents or become a member.
Cyber Security: Risks and Solutions for South Cross University
|12
|2052
|467
Cyber Security: BYOD Risk Assessment, Certificate-Based Authentication, and Anti-Phishing Guideline
|12
|2542
|257
BYOD Risk Assessment Task 1: Critical Components 2 2 Cyber Security Name of University Author
|15
|2429
|149
Overview of Network Security
|8
|2332
|431
Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491
BYOD Policy Threats and Security Strategies for Cybersecurity
|11
|2820
|426