Explain working principle of the Authentication mechanism

Assignment Help Other Subject
Reference no: EM132358571

Cybersecurity Assignment - Security consultation report and guideline

Task Description - You are hired by the organisation, such as Southern Cross University, selected in Ass1, as a cybersecurity consultant to work on a security program to address the contemporary and emerging risks from the cyber threats the organisation is facing. Your tasks are the following:

Task 1: the organisation is currently using a password based authentication system to control the user access to the organisation's information system. However, the Bring Your Own Device (BYOD) policy recently implemented by the organisation has raised some security concerns. As a security consultant, assess the risk from the BYOD policy to the organisation's information system.

Task 2: After the assessing the risk from the BYOD policy, you suggest the organisation to replace the current password-based authentication scheme with a Certificate-Based Authentication for both device and user authentication. To justify your suggestion, write a technical report to explain the working principle of the Certificate-Based Authentication mechanism and discuss why the organisation should use the mechanism in this case by comparing it with the password-based authentication mechanism. Use figure when necessary to support your answers.

Task 3: You have identified "Phishing" is among the top cybersecurity threats facing by the organisation. Use available online (e.g., Internet) resources to develop a guideline for the organisation staff to combat with the threat. The guideline will include the following:

  • Definition of phishing and its distinctive characteristics.
  • At least three (3) real examples showing the phishing characteristics.
  • An instruction to the users of how to recognise and safely handle a phishing attack.
  • An instruction to the IT administrator of how to minimise the phishing threat.

Assignment guideline -

Task 1: BOYD risk assessment

To complete this task, use the following guidelines:

  • Identify the most critical components of the organisation information system - the critical information assets.
  • Identify what threats the BYOD policy may bring to the identified critical assets.
  • Identify potential vulnerabilities of each asset against the identified threats.
  • Assess the risk to the organisation information system using either quantitative or qualitative risk assessment approach and document the risk assessment process.

Task 2: Certificate-based Authentication

To complete this task, use the following guidelines:

  • Perform necessary research to understand the working principle, pros and cons of the Certificate-based Authentication mechanism. Document all reference sources.
  • Write a technical report to explain the working principle of the Certificate-based Authentication mechanism. Compare the certificate-based authentication against the password-based authentication and highlight the features you think are useful for combating the threats from the BYOD policy for device and user authentication at the same time.
  • Note that you are not allowed to cut and paste from online resources. Use your own words and figures. Acknowledge all reference sources.

Task 3: Anti-phishing guideline

To complete this task, use the following guidelines:

  • Read online resources, such as Black (2005) "Phish to Fry: Responding to the Phishing Problem". Journal of Law and Information Science, 16(1), pp. 73-91 to define what type of electronic messages should be treated as phishing, what are the distinctive characteristics of a phishing and what act is considered as phishing?
  • Search for 3 representative examples of phishing or use your own phishing as examples.
  • Use samples from reputable online resources to help you with the development of phishing handling instructions. The instructions should be clear, concise and precise.

References -

1. Legal Issues in Secure Implementation of Bring Your Own Device (BYOD) by Madhavi Dhingra.

2. An Exploratory Study on BYOD in Class: Opportunities and Concerns by Aaron M. French, Mark Schmidt, Chengqi Guo and J.P. Shim.

3. BYOD Security: A New Business Challenge by Kathleen Downer and Maumita Bhattacharya.

4. Bring Your Own Device (BYOD) Policy and Procedure.

5. A Review of Bring Your Own Device on Security Issues by Morufu Olalere, Mohd Taufik Abdullah, Ramlan Mahmod and Azizol Abdullah.

6. Bring Your Own Device (BYOD) in Higher Education: Opportunities and Challenges by Rahat Afreen.

Attachment:- Cybersecurity Assignment Files.rar

Verified Expert

The report has been exemplary in identifying the manner in which the BYOD policy needs to be implemented within the organisational context.It has been resourced from the report that certificate based authentication is more beneficial as compared to the password based authentication when it comes to the induction of BYOD policy.

Reference no: EM132358571

Questions Cloud

Write on topic - Synthesis of DDT and BHC : Assignment - Write 5 pages on topic - Synthesis of DDT and BHC
Important aspect of healthcare strategic planning : Stakeholder analysis is a very important aspect of healthcare strategic planning. Aspiring healthcare leaders need to be good at this.
The organizational strategy and organizational culture : The organizational strategy. The organizational design and your assessment of the effectiveness. The organizational culture.
Suppose your company raises funds from outside lenders : Suppose your company raises funds from outside lenders. What type of agency costs might occur? How might lenders mitigate the agency costs?
Explain working principle of the Authentication mechanism : CMP71001 Cybersecurity Assignment - Security consultation report & guideline, Southern Cross University. Explain working principle of Authentic mechanism
Bounded rationality perspective or rational decision making : Bounded Rationality Perspective or Rational Decision Making. Discussing about how the article relates to the concept of the TOPIC selected.
Global sourcing decision case study : Analyze Shanti's two alternatives-whether to follow a global insourcing or outsourcing strategy. What are the potential benefits and risks?
What the benefits to joining your selected professional : 200914 Working in Professions Assignment - Executive Summary and Presentation, Western Sydney University, Australia. What the benefits to joining
Analyze the legal and ethical ramifications : Analyze legal and ethical ramifications of purchasing manager's offer to the customs official? Which US trade laws should you consider when selecting country?

Reviews

len2358571

8/18/2019 10:56:58 PM

This assignment is developmental and cumulative. You are strongly advised to start doing this assignment from Week-7 in your study. Leaving your starting date to the week before the due date is a very poor strategy for success in the unit. Assignment-2 Marking Rubric - The following marking rubric will be used for the marking of your submission. It contains a detailed breakdown of the marking criteria for this assignment. Make sure you read CAREFULLY this to understand how your work would be graded against each of the defined criteria.

len2358571

8/18/2019 10:56:49 PM

Access control is a critical component of any information system. WFA can help to identify the most critical component. If you don't use WFA, provide arguments to justify your choice of the critical components. Do not bring in any threats. Think about BYOD policy. Use TVA worksheet to document this process. You can use either quantitative or qualitative risk assessment method. Reference from reputable sources e.g. textbook, research papers, technical reports.

len2358571

8/18/2019 10:56:42 PM

Submission Format - When you have completed the assignment, you are required to submit your assignment in the PDF/DOC format. Marks and Feedback - All assessment materials submitted during the semester will normally be marked and returned within two weeks of the required date of submission (provided that the assessment materials have been submitted by the due date). Marks will be made available to each student via the MySCU Grade book.

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd