logo

Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guideline

Assess the risk from the BYOD policy to the organization's information system

9 Pages2240 Words285 Views
   

Added on  2023-04-25

About This Document

This report discusses the risks associated with BYOD policy and suggests adopting certificate-based authentication and anti-phishing guidelines to enhance the security of Southern Cross University data. It includes a BOYD risk assessment, certificate-based authentication, and anti-phishing guideline.

Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guideline

Assess the risk from the BYOD policy to the organization's information system

   Added on 2023-04-25

ShareRelated Documents
Cyber security
Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guideline_1
CYBER SECURITY
1
Table of Contents
Introduction...........................................................................................................................................2
BOYD risk assessment............................................................................................................................2
Certificate-based Authentication...........................................................................................................3
Anti-phishing guideline..........................................................................................................................4
Conclusion.............................................................................................................................................6
References.............................................................................................................................................7
Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guideline_2
CYBER SECURITY
2
Introduction
Security of information in the organization is one of the crucial steps and it is associated
with the security threats that occur due to lack of security. The southern cross
university is the facing the issue of security threats and attacks and they also developed
bring your own device policy to control and manage security risks. The goal of this
technical report is to analysis the security risks associated with the BYOD policy and
improving the security of the Southern Cross university data by adopting certificate-
based authentication. This report is divided into main three tasks such as BOYD risk
assessment, certificate-based authentication, and Anti-phishing guideline.
BOYD risk assessment
There are many critical components of the organization information system such as
access control, security of information and data, managing database centre, and
configuring the communication networks (Crossler et al. 2014). In which security of the
data is one of the critical components that faced by the organization and they use the
internet connectivity which associated with the threats and risks like cyber-crimes,
phishing, malware and so on. There are several threats and risk the BYOD policy may
bring to the evaluated critical assets such as no password protection, data breach, non-
encrypted data and connection, and risk of insecure use (Moyer 2013). The
vulnerabilities of the above threats and risk are lack of security, use of unauthentic
servers and networks, use of the third-party application, configuration conflict and
many more. Encryption, use of high-level password technique, cryptography all these
are very best approaches to assess the risks to the organization information system.
Encryption provides a way to convert information into a form of code which cannot be
accessed without user permission. High-level password system can be used because the
organization uses the low password system which can easily detect by the attacks so,
they can design and develop the high-level password system. In order to control and
monitor the risks associated with the BYOD policy, an organization can adopt the
cryptography technology that has the potential to detect and identify the viruses and
traffic signals from the server.
Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guideline_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security: Risks and Solutions for South Cross University
|12
|2052
|467

Cyber Security: BYOD Risk Assessment, Certificate-Based Authentication, and Anti-Phishing Guideline
|12
|2542
|257

BYOD Risk Assessment Task 1: Critical Components 2 2 Cyber Security Name of University Author
|15
|2429
|149

Overview of Network Security
|8
|2332
|431

Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491

BYOD Policy Threats and Security Strategies for Cybersecurity
|11
|2820
|426