Identify potential vulnerabilities of each asset

Assignment Help Other Subject
Reference no: EM132126196

Task Description

You are hired by Southern Cross University as a cybersecurity consultant to work on a security program to address the contemporary and emerging risks from the cyber threats the university is facing. Your tasks are the following:

Task 1: the university is currently using a password based authentication system to control the user access to the university's information system. However, the Bring Your Own Device (BYOD) policy recently implemented by the university has raised some security concerns. As a security consultant, assess the risk from the BYOD policy to the university's information system.

Task 2: After the assessing the risk from the BYOD policy, you suggest the university to replace the current password-based authentication scheme with a Certificate-Based Authentication. To justify your suggestion, write a technical report to explain the working principle of the Certificate-Based Authentication mechanism and discuss why the university should use the mechanism in this case by comparing it with the password-based authentication mechanism. Use figure when necessary to support your answers.

Task 3: You have identify Spamming is among the top cybersecurity threats facing by the university. Use the Spam Act 2003 and available online resources to develop a guideline for the university students and staff to combat with the threat. The guideline will include the following:

o Definition of spam and its distinctive characteristics.

o At least three (3) real examples of spams showing the spam characteristics.
o An instruction to the users of how to recognise and safely handle a spam.
o An instruction to the IT administrator of how to minimize the spam threat.

Assignment guideline

Task 1: BOYD risk assessment
To complete this task, use the following guidelines:
- Identify the most critical components of the university's information system - the critical information assets.
- Identify what threats the BYOD policy may bring to the identified critical assets.
- Identify potential vulnerabilities of each asset against the identified threats.
- Assess the risk to the university's information system using either quantitative or qualitative risk assessment approach and document the risk assessment process.

Task 2: Certificate-based Authentication
To complete this task, use the following guidelines:
- Perform necessary research to understand the working principle, pros and cons of the Certificate-based Authentication mechanism. Document all reference sources.
- Write a technical report to explain the working principle of the Certificate-based Authentication mechanism. Compare the certificate-based authentication against the password-based authentication and highlight the features you think are useful for combating the threats from the BYOD policy.
- Note that you are not allowed to cut and paste from online resources. Use your own words and figures. Acknowledge all reference sources.

Task 3: Anti-spam guideline
To complete this task, use the following guidelines:
- Read and understand Spam Act 2003. The Spam Act 2003 document is available at: https://www.legislation.gov.au/Details/C2016C00614. The Act will help you to define what type of electronic messages should be treated as spams, what are the distinctive characteristics of a spam and what act is considered as spamming?
- Search for 3 representative examples of spams or use your own spams as examples.
- Use samples from reputable online resources to help you with the development of spam handling instructions. The instructions should be clear, concise and precise.

Attachment:- Assignment.rar

Reference no: EM132126196

Questions Cloud

Prepare the financial statement for both greg and tina : Future Cash Flows (undiscounted) $115,000, Using the above information, prepare the financial statement for both Greg and Tina for the year ending 12/31/16
What are some resources available for families : What challenges might families face when it comes to caring for an elderly family member or a family member with a disability?
Discuss the new perspectives you may have gained : What has changed and why? Discuss the new perspectives you may have gained as a result of the observations and the introduction of new content.
Elaborate on how the ses impacts the work equation : Elaborate on how (or whether) the SES impacts the work equation between a service delivery provider and a service delivery recipient.
Identify potential vulnerabilities of each asset : CMP71001 - Cybersecurity - Identify the most critical components of the university's information system - the critical information assets
Sshould you provide depression screenings in the community : Should you screen all new clients for substance abuse regardless of presenting problem?
How can we reduce the stigma of methadone clients : My first research question would be how can we reduce the stigma of methadone clients being just legal junkies switching one addiction for another?
Find out what you need to do to attain your goal : Pretend that you are a recent immigrant who wants to become a citizen. Find out what you need to do to attain your goal.
What type of murder did anakin commit in killing his wife : How can you justify this statement using the types/forms of terrorists described in Chapter 10 (you'll have to jump ahead in the reading)?

Reviews

len2126196

9/29/2018 1:00:10 AM

The project is realised to a very high professional standard. Technically it is fully functional and meets all specifications. It demonstrates high levels of creativity and innovation both in terms of its function and usability. It has been carefully quality controlled to ensure full functionality and that no errors are evident. The project is realised to a high professional standard, with a good level of functionality and meets most specifications. It demonstrates occasional levels of creativity and innovation. While there may be a few errors, these are of a minor nature. Generally the product would be well-regarded by industry standards. The project is realised to an acceptable professional standard with generally adequate levels of functionality and generally meets specifications, although there are a number of problems evident. There is evidence of creativity and innovation although these are not sustained throughout. Further development could have improved this product.

len2126196

9/29/2018 12:58:56 AM

Weight 30% of overall unit assessment Suggestion This assignment is developmental and cumulative. You are strongly advised to start doing this assignment from Week-6 in your study. Leaving your starting date to the week before the due date is a very poor strategy for success in the unit. It is a University requirement that a student’s work complies with the Academic Policy, Chapter 4.20 on Student Academic Integrity. It is a student’s responsibility to be familiar with the Policy. Failure to comply with the Policy can have severe consequences in the form of University sanctions. For information on this Policy please refer to Chapter 4.20 on Student Academic Integrity

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd