logo

Cyber Security: BOYD Risk Assessment, Certificate-based Authentication, Anti-spam Guideline

   

Added on  2023-06-05

10 Pages1882 Words414 Views
CYBER SECURITY
Cyber Security
Name of the Student
Name of the University
Author Note
Cyber Security: BOYD Risk Assessment, Certificate-based Authentication, Anti-spam Guideline_1
1
CYBER SECURITY
Table of Contents
Introduction................................................................................................................................2
Task 1: BOYD risk assessment..................................................................................................2
Task 2: Certificate-based Authentication...................................................................................3
Task 3: Anti-spam guideline......................................................................................................5
Conclusion..................................................................................................................................6
Reference....................................................................................................................................7
Cyber Security: BOYD Risk Assessment, Certificate-based Authentication, Anti-spam Guideline_2
2
CYBER SECURITY
Introduction
The prime objective of this paper is to focus on the privacy and security issues
associated with a university. The university has different kinds of stakeholders such as the
internal stakeholder and external stake holder (Yan et al. 2018). The different types of
stakeholders use the private network of the college which is a real matter of concern
considering the network security of the college. The paper will be focusing on the different
threats which the college network might be facing in the coming years. The paper will
provide a perception about the newly adopted policy of the college authority (Liu and
Murphy 2016). The existing and the proposed type of authentication types will be discussed
in this paper with prime importance. The paper will also highlight the effectiveness of the
password-based authentication schemes with the certificate-based authentication.
Task 1: BOYD risk assessment
This unit of the paper will be focusing on the newly incorporated policy of a
university. The new policy was supposed to be helping the college authority to cope up with
the internal threats of the private network used by the college authority (Pusey, Gondree and
Peterson 2016). The website used by the college authority has two major specifications such
as the user module which is maintained by the students and the admin panel which are
maintained by the teaching staffs of the college. Alteration of essential data can be a huge
loss from the point of view of both college authority as well as from student perspective
(Baylis et al. 2017). The library management system is the other essential component of the
college which is very much prone to the security issue as a wide range of users both outside
and inside the environment are accessing the system. The threats coming from the internal
stakeholders is also considered as a cyber-security threat. The newly incorporated BRING
Cyber Security: BOYD Risk Assessment, Certificate-based Authentication, Anti-spam Guideline_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cybersecurity Issues in Southern Cross University: A Security Consultation Report
|11
|2642
|459

Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guideline
|9
|2240
|285

Professional Paper Elements -
|10
|2570
|15

Cyber Security - Assignment
|14
|3398
|36

Cybersecurity Threats and Anti-Spam 3 CONCLUSIONS 4 INTRODUCTION Cybersecurity Threats and Anti-Spam 3 CONCLUSION 3 REFERENCES 4 INTRODUCTION Cybersecurity Threats and Anti-Spam 3 CONCLUSION 3 REFEREN
|7
|1670
|122

Assessing Cybersecurity in an Organization: BYOD Policy and Phishing Risks
|12
|2224
|335