logo

Security Consultation Report and Guideline

   

Added on  2022-10-19

13 Pages2447 Words371 Views
Running head: SECURITY CONSULTATION REPORT AND GUIDELINE
Security Consultation Report and Guideline
Name of the Student
Name of the University
Author note

SECURITY CONSULTATION REPORT AND GUIDELINE1
Table of Contents
Task 1...............................................................................................................................................2
1.1 Components of Organisation Information System................................................................2
1.2 Identification of Threats brought with the BYOD Policy.....................................................2
1.3 Identification of Potential Vulnerabilities.............................................................................4
1.4 Assessment of Risks to Organisation Information System....................................................5
Task 2...............................................................................................................................................6
2.1 Working Principle of Certificate-based Authentication........................................................6
2.2 Comparison and contrast over authentication techniques.....................................................6
2.3 Identification of features for Certificate-based device and BYOD Policy............................7
Task 3...............................................................................................................................................7
3.1 Characteristics of a Phishing Act...........................................................................................7
3.2 Representative examples of phishing....................................................................................8
3.3 Phishing Handling Instruction...............................................................................................8
References......................................................................................................................................10

SECURITY CONSULTATION REPORT AND GUIDELINE2
Task 1
1.1 Components of Organisation Information System
The critical aspects in relation to organisation information system are:
1. Hardware – This can be defined as the physical technology that helps to make the
system work. Keyboards, routers and external hard drives could be defined as some form of
hardware systems.
2. Software – The computer hardware would need an inbuilt software that would help the
functioning of the computer systems (Lee, Park and Lee 2015). Operating system forms the most
important piece within the system that helps in the designing of specific tasks.
3. Telecommunications – This component helps in establishing a connection between
the hardware and software systems. These connections could be established through physical
wires such as fibre optics, Ethernet cables and also through Wi-Fi technology. Based on the
disperse nature of computers, the network strength would be dependent in order to establish a
proper connection.
4. Data warehouses and Databases – A database can be defined as a place in which a
large pool of data could be stored. A data warehouse helps in storing of data that is highly
needed by organization. These form the repositories that help in the storing of large forms of data
that could be analysed and results be produced.
1.2 Identification of Threats brought with the BYOD Policy
The different threats that could be made with the impact of the BYOD policy are:

SECURITY CONSULTATION REPORT AND GUIDELINE3
1. Increasing risks due to data leakage – With the high form of reliance over mobile
devices, there has been major risks of data being leaked without the prior information to
customers and employees. Irregularity in patch updates being supported to the system software
could be one of the primary reason behind the risk of data leakage.
2. Exploitation of vulnerabilities – Any official within an organization has less control
over mobile device usage. Hence, they are highly susceptible to attacks being raised over the
system.
3. Combination of business and personal data – The most obvious challenges made to
BYOD policy is based on the storage of personal and corporate data. The highest threats is that
malware being installed within the mobile devices (Eslahi et al. 2014). This means that a
particular malware application could get installed when the user would make use of the network
supported within the organization.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Consultation Tasks 2022
|8
|1840
|8

Cybersecurity: BYOD Risk Assessment, Certificate-based Authentication, Anti-phishing Guideline
|10
|2414
|209

Cyber Security: Risks and Solutions for South Cross University
|12
|2052
|467

Cyber Security: BYOD Risk Assessment, Certificate-Based Authentication, and Anti-Phishing Guideline
|12
|2542
|257

Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guideline
|9
|2240
|285

BYOD Risk Assessment Task 1: Critical Components 2 2 Cyber Security Name of University Author
|15
|2429
|149