logo

Risk Assessment of Southern Cross University

This assignment is about the BYOD policy and procedure at Performance Education, its purpose, background, objectives, scope, and responsibilities of students and staff regarding BYOD. It also includes a task to identify critical components of the university's information system, threats to the BYOD policy, vulnerabilities of assets, and risk assessment. Another task involves assessing the risk from the BYOD policy to the university's information system. The assignment also mentions the BYOD policy at the University of Strathclyde and its introduction, benefits, information security policies, and the need to protect data and intellectual property.

13 Pages2466 Words317 Views
   

Added on  2023-06-03

About This Document

This assignment discusses the risk assessment of Southern Cross University's information system, potential threats to critical information assets, vulnerabilities of each asset, certificate-based authentication, comparison with password-based authentication, characteristics of spam and spamming act, and spam handling instructions.

Risk Assessment of Southern Cross University

This assignment is about the BYOD policy and procedure at Performance Education, its purpose, background, objectives, scope, and responsibilities of students and staff regarding BYOD. It also includes a task to identify critical components of the university's information system, threats to the BYOD policy, vulnerabilities of assets, and risk assessment. Another task involves assessing the risk from the BYOD policy to the university's information system. The assignment also mentions the BYOD policy at the University of Strathclyde and its introduction, benefits, information security policies, and the need to protect data and intellectual property.

   Added on 2023-06-03

ShareRelated Documents
Running Head: CYBER SECURITY IN SOUTHERN CROSS UNIVERSITY
Risk Assessment of Southern Cross University
Name of the student:
Name of the university:
Author note:
Risk Assessment of Southern Cross University_1
1CYBER SECURITY IN SOUTHERN CROSS UNIVERSITY
Table of Contents
Introduction......................................................................................................................................2
Task 1...............................................................................................................................................2
Critical Components of the Southern Cross University’s Information System...........................2
BYOD Policy threats to critical information assets.....................................................................2
Potential vulnerabilities of each assets against the identified threats..........................................3
Vulnerability to data governance......................................................................................3
Vulnerability to master data governance..........................................................................3
Vulnerability to financial data and policy.........................................................................4
Vulnerability to software tools..........................................................................................4
Risk assessment of the university’s information system.............................................................4
Task 2...............................................................................................................................................5
Brief explanation of Certificate-based Authentication................................................................5
Comparison between certificate-based authentication and password-based authentication.......6
Features of certificate-based authentication................................................................................6
Task 3...............................................................................................................................................7
Characteristics of Spam and Spamming Act...............................................................................7
Three representative examples of Spams....................................................................................8
Spam handling instruction...........................................................................................................8
Conclusion.......................................................................................................................................9
Reference.......................................................................................................................................10
Risk Assessment of Southern Cross University_2
2CYBER SECURITY IN SOUTHERN CROSS UNIVERSITY
Risk Assessment of Southern Cross University_3
3CYBER SECURITY IN SOUTHERN CROSS UNIVERSITY
Introduction:
This assignment will enlighten on the risk assessment of Southern Cross University. The
common risks faced by the university in maintaining the information systems is discussed in the
assignment. To manage risks, the university is using a password based authentication system so
that the access to the university’s information system can be restricted and controlled. However,
the BYOD (Bring Your Own Device) policy is posing great threats to the university. The
following paragraphs will deal with risk assessment of the BYOD policy to the university’s
information system, the advantages of Certificate based authentication over password-based
authentication followed by providing a guideline for anti-spamming.
Task 1:
Critical Components of the Southern Cross University’s Information System:
The critical information assets of Southern Cross University are software tools, Data governance,
Master data governance and financial policies. The software tools are required to protect the data
assets of the university by facilitating data governance. The university has adopted various data
governance software tools and technology to keep the data confidential.
BYOD Policy threats to critical information assets:
The potential threats that arises from Bring your own device policy to information assets of
universities are as follows:
The personal devices like smart phones laptops and tablets that are brought inside the
campus of the university are connected to the network of the university through LANs or
VLANs. If the devices contain viruses in it, then the viruses would contaminate the
Risk Assessment of Southern Cross University_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
BYOD Risk Assessment Task 1: Critical Components 2 2 Cyber Security Name of University Author
|15
|2429
|149

BYOD Policy Threats and Security Strategies for Cybersecurity
|11
|2820
|426

Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guideline
|9
|2240
|285

Professional Paper Elements -
|10
|2570
|15

Why is cybersecurity important for the education sector?
|14
|3669
|11

Solutions of Cybersecurity Assignment
|9
|2005
|320