logo

Professional Paper Elements -

   

Added on  2022-08-20

10 Pages2570 Words15 Views
“Title Page”
Will include the following:
Title
This is the title of your report and will include the name of the organisation.
Author name
Author SID
Date
Professional Paper Elements -_1
Summary
With the implementation of the password-based authentication along with the
policy of Bring Your Own Device, the Southern Cross University has potentially
identified some of the cyber threats that might harm the working of the
information system and steal the data in this regard. In this report, the risks
associated with BYOD policy has been identified that might potentially harm the
information system of the university. Following this, the password-based
authentication has been suggested to be replaced with the certificate-based
authentication as a measure of mitigating the posed threats to the information
system. Lastly, the report has been used to put forward the real meaning of
spam, the cause of the same with relative examples from real life. In addition to
this, suggestions to stop or reduce such spam emails have been placed forward
as a measure of mitigating the same.
Professional Paper Elements -_2
Table of Contents
“Title Page”........................................................................................................... 1
Title.................................................................................................................... 1
Author name....................................................................................................... 1
Author SID.......................................................................................................... 1
Date.................................................................................................................... 1
Summary............................................................................................................... 2
Table of Contents.................................................................................................. 3
1. Introduction....................................................................................................... 4
2. BOYD Risk Assessment...................................................................................... 4
3. Certificate-Based Authentication.......................................................................5
4. Anti-spam Guideline.......................................................................................... 6
5. Conclusions........................................................................................................ 8
List of References.................................................................................................. 9
Professional Paper Elements -_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Risk Assessment of Southern Cross University
|13
|2466
|317

Cyber Security: BYOD Risk Assessment, Certificate-Based Authentication, and Anti-Phishing Guideline
|12
|2542
|257

Cyber Security: Risks and Solutions for South Cross University
|12
|2052
|467

Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guideline
|9
|2240
|285

Cyber Security - Assignment
|14
|3398
|36

Why is cybersecurity important for the education sector?
|14
|3669
|11