logo

Cybersecurity: BYOD Risk Assessment, Certificate-based Authentication, Anti-phishing Guideline

Assess the risk from the BYOD policy to the organization's information system

10 Pages2414 Words209 Views
   

Added on  2022-11-10

About This Document

This document discusses the risks associated with Bring Your Own Device (BYOD) policy in organizations and suggests solutions such as certificate-based authentication and anti-phishing guidelines to reduce cyber threats. It covers topics such as BYOD risk assessment, certificate-based authentication, and anti-phishing guidelines.

Cybersecurity: BYOD Risk Assessment, Certificate-based Authentication, Anti-phishing Guideline

Assess the risk from the BYOD policy to the organization's information system

   Added on 2022-11-10

ShareRelated Documents
Running head: CYBERSECURITY
CYBERSECURITY
Name of the Student:
Name of the University:
Author Note:
Cybersecurity: BYOD Risk Assessment, Certificate-based Authentication, Anti-phishing Guideline_1
CYBERSECURITY1
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
BYOD Risk Assessment........................................................................................................2
Certificate-based Authentication............................................................................................4
Anti-phishing guideline..........................................................................................................5
Conclusion..................................................................................................................................7
References..................................................................................................................................8
Cybersecurity: BYOD Risk Assessment, Certificate-based Authentication, Anti-phishing Guideline_2
CYBERSECURITY2
Introduction
User authentication within systems is the cornerstone for security of computers for
many years. Idea of password and user-id method is used in the system which is cost efficient
and effective to maintain shared secret among user and computer system. Authentication
system based on password is used currently by the organization for controlling access to
information system of the organization. However, recent Bring Your Own Device (BYOD)
policy’s implementation to the system has raised few security concerns (Farash & Attari
2014). BYOD policy is set of rules which governs level of support of IT department for
systems owned by employee. The line among organization owned and personal data will get
changed and the devices which are connected to the organization is showing new security
issues.
Discussion
BYOD Risk Assessment
Information system of an organization consists of a set of different components that
deals with organizing and collecting information and data. Information system of the
organization depends on the following five essential components:
Computer Hardware: It is a physical technology which works with data. The
hardware’s size can be as small as smartphones which can be kept inside a pocket or
as big as supercomputer. With rise of Internet of Things (IoT), from which any
devices from small appliances to vehicles would be able in receiving and transmitting
data.
Computer Software: Software’s role is making decisions of the actions of hardware.
Software are of two types: application software and system software. Application
Cybersecurity: BYOD Risk Assessment, Certificate-based Authentication, Anti-phishing Guideline_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Solutions of Cybersecurity Assignment
|9
|2005
|320

Security Consultation Report and Guideline
|13
|2447
|371

Security Consultation Tasks 2022
|8
|1840
|8

Cyber Security: Risks and Solutions for South Cross University
|12
|2052
|467

Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guideline
|9
|2240
|285

Why is cybersecurity important for the education sector?
|14
|3669
|11