logo

Solutions of Cybersecurity Assignment

   

Added on  2020-12-09

9 Pages2005 Words320 Views
 | 
 | 
 | 
CYBERSECURITY
Solutions of Cybersecurity Assignment_1

TABLE OF CONTENTSINTRODUCTION...........................................................................................................................1TASK 1............................................................................................................................................1Assessment of risk from Bring Your Own Device (BOYD) policy to university's informationsystem..........................................................................................................................................1TASK 2............................................................................................................................................3Working principle of the Certificate Based Authentication mechanism....................................3TASK 3............................................................................................................................................4Top Cybersecurity Threats and Anti-Spam.................................................................................4CONCLUSION................................................................................................................................5REFERENCES................................................................................................................................6
Solutions of Cybersecurity Assignment_2

INTRODUCTIONAdvancement of technology have increased the movement of database in this inter-connected network. This large source of information requires protection and security in thistechnology-based world and this can be considered as cybersecurity which allows protection ofdata from an unauthorised user. It will also provide risk assessment of “Bring Your OwnDevice” policy. Present study will provide solutions of cybersecurity which helps in protectingthe confidential and secured information. This report will also provide conceptual mechanism ofpassword and certificate-based mechanism. TASK 1Assessment of risk from Bring Your Own Device (BOYD) policy to university's informationsystemUniversity contains large amount of secured data which needs to be protected against thecybercrimes. Cybersecurity is one of the greatest concerns for large organisations who used todeal with huge amount of database collection on regular basis (Taeihagh & Lim, 2018). Thesouthern cross university is currently using Bring Your Own device (BYOD) policy whichensures the use of password-based authentication. It was disclosed that unauthorised users aretrying to access the information which might bring threat to secured one. As a technicalconsultant of college, various risk components are identified in order to protect the data fromfraudulent practices. Most critical components of university's information system are as follows:These are mainly those assets which helps in protecting the financial data andconfidential details of students etc. It includes identifying the data and information assets of the college which requires moresecurity.Determining the strategies to prevent loss of information and it will ensure properimplementation of cybersecurity policies.Threats related to BYOD concept Bring Your Own Device uses the principle of Password-based authentication and thisconcept mainly asks for user name and password unlock secured data (Carter & Sofio, 2017).Consultant advisor of southern university have found many disadvantages as it is less secured1
Solutions of Cybersecurity Assignment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cybersecurity Threats and Anti-Spam 3 CONCLUSIONS 4 INTRODUCTION Cybersecurity Threats and Anti-Spam 3 CONCLUSION 3 REFERENCES 4 INTRODUCTION Cybersecurity Threats and Anti-Spam 3 CONCLUSION 3 REFEREN
|7
|1670
|122

Cyber Security: Risks and Solutions for South Cross University
|12
|2052
|467

Cyber Security: BYOD Risk Assessment, Certificate-Based Authentication, and Anti-Phishing Guideline
|12
|2542
|257

Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guideline
|9
|2240
|285

Cyber Security - Assignment
|14
|3398
|36

Why is cybersecurity important for the education sector?
|14
|3669
|11