Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

You are hired by University as a cybersecurity consultant to work on a security program to address the contemporary and emerging risks from the cyber

You are hired by University as a cybersecurity consultant to work on a security program to address the contemporary and emerging risks from the cyber threats the university is facing. Your tasks are the following: Task 1: the university is currently using a password based authentication system to control the user access to the universitys information system. However, the Bring Your Own Device (BYOD) policy recently implemented by the university has raised some security concerns. As a security consultant, assess the risk from the BYOD policy to the university's information system. Task 2: After the assessing the risk from the BYOD policy, you suggest the university to replace the current password-based authentication scheme with a Certificate-Based Authentication. To justify your suggestion, write a technical report to explain the working principle of the Certificate-Based Authentication mechanism and discuss why the university should use the mechanism in this case by comparing it with the password-based authentication mechanism. Use figure when necessary to support your answers. Task 3: You have identify Spamming is among the top cybersecurity threats facing by the university. Use the Spam Act 2003 and available online resources to develop a guideline for the university students and staff to combat with the threat. The guideline will include the following: o Definition of spam and its distinctive characteristics. 2 o At least three (3) real examples of spams showing the spam characteristics. o An instruction to the users of how to recognise and safely handle a spam. o An instruction to the IT administrator of how to minimize the spam threat. Assignment-2 guideline Task 1: BOYD risk assessment To complete this task, use the following guidelines: Identify the most critical components of the university's information system - the critical information assets. Identify what threats the BYOD policy may bring to the identified critical assets. Identify potential vulnerabilities of each asset against the identified threats. Assess the risk to the university's information system using either quantitative or qualitative risk assessment approach and document the risk assessment process. Task 2: Certificate-based Authentication To complete this task, use the following guidelines: Perform necessary research to understand the working principle, pros and cons of the Certificate-based Authentication mechanism. Document all reference sources. Write a technical report to explain the working principle of the Certificate-based Authentication mechanism. Compare the certificate-based authentication against the password-based authentication and highlight the features you think are useful for combating the threats from the BYOD policy. Note that you are not allowed to cut and paste from online resources. Use your own words and figures. Acknowledge all reference sources. Task 3: Anti-spam guideline To complete this task, use the following guidelines: Read and understand Spam Act 2003. The Spam Act 2003 document is available at: https://www.legislation.gov.au/Details/C2016C00614. The Act will help you to define what type of electronic messages should be treated as spams, what are the distinctive characteristics of a spam and what act is considered as spamming? Search for 3 representative examples of spams or use your own spams as examples. Use samples from reputable online resources to help you with the development of spam handling instructions. The instructions should be clear, concise and precise. This is a 1500 words report

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Graph Database Modeling With Neo4j

Authors: Ajit Singh

2nd Edition

B0BDWT2XLR, 979-8351798783

More Books

Students also viewed these Databases questions

Question

Describe Table Structures in RDMSs.

Answered: 1 week ago