Identify and briefly describe four risks

Assignment Help Computer Engineering
Reference no: EM133499417

Question: A Further Education college has recently fallen victim to a cyber security related incident. This happened after a student connected their laptop to the college network using a cable and was allocated an IP address. In doing so, it allowed the accidental transfer of a virus from the laptop to the college system, which led to the IT infrastructure being compromised. This has prompted the IT manager to carry out a full review of all their systems.

a.Outline three steps that could have been taken to prevent the laptop from accessing the college network.

b.The college currently uses an 'ad-hoc' wi-fi system to let students connect to the Internet, however this incident has prompted management into implementing a strict Bring Your Own Device (BYOD) policy throughout the whole college.

i.What advice would you give to the college when starting out on the development of their BYOD policy? In your answer, you should consider advice on acceptable use, the goal of the policy as well as technical considerations.

ii.The National Cyber Security Centre (NCSC) comment that when implementing BYOD, organisations need to consider 'what would happen if the services you intend to expose were compromised and the business impact it would cause' (NCSC, 2021).

Whilst considering the context of the college and their BYOD implementation, access the NCSC Device Security Guidance page

Identify and briefly describe four risks that you think the college should be taking into account in their BYOD implementation.

Reference no: EM133499417

Questions Cloud

What have we learned in this course regarding flood myths : What have we learned in this course regarding flood myths of the ancient river valley civilizations? How were the stories of Noah and Gilgamesh that we read
Critical thinking is the most important step : Critical Thinking is the most important step in the process of Technical Communication." Explain the reasoning and justification for the position you take
Define plasma and serum in your own words : Define plasma and serum in your own words. This should be in complete sentences. Describe the purpose of each blood collection tube.
Do you agree that some businesses have a really good idea : Do you agree that some businesses have a really good idea but lack of fund or marketing? Giving them the opportunity to tap into a larger pool of resources
Identify and briefly describe four risks : Identify and briefly describe four risks that you think the college should be taking into account in their BYOD implementation.
Compare and contrast the u.s. constitution and the arizona : Discuss the impact of the Progressive movement on the creation of the Arizona Constitution, including the declaration of rights, ballot initiatives
Stride framework for iot health application : Give an example of Elevation of Privileged in STRIDE framework for IOT health application and Give an example of Repudiation in STRIDE framework for IOT health
How might you prepare yourself for an evaluation system : How might you prepare yourself for an evaluation system that combines quality of presentation with degree of student learning?
Draft a legislative letter to a specific legislator : NSG 600- Draft a Legislative Letter to a specific legislator and offer support or a constructive argument against pending or passed policy or legislation.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a c program to find the count of words

Write a C program to find the count of words and optionally the longest and or shortest words in a string input by the user or coming from a file.

  Traditional risk management and enterprise risk management

What do you think is the difference between traditional risk management and enterprise risk management?

  Develop a new information security policy

If you were asked by your employer to develop a new Information Security Policy, where would you turn to find resources to build this policy?

  What classes would you define in implementing the projects

What classes would you define in implementing the following projects? What methods would your classes possess?

  Create and implement forest named wwtc

Create Active directory policies to include recommended features. Create and implement forest named WWTC. Create OU for each Department under forest WWTC.

  Write a program for an automatic teller machine

Write a program for an automatic teller machine that dispenses money.

  What are the strategic and technical security measures

Considering the importance of data in an organization, it is absolutely essential to secure the data present in the database. What are the strategic and.

  Create a main driver class

Design and implement a set of classes that keeps track of various sports statistics. Have each low-level class represent a specific sport.

  Calculate the optimal number n of packets

Calculate the optimal number N of packets that should be used in order to transfer the entire 1 MB data set in the least amount of time.

  Define place to manage ongoing security

what kinds of corporate procedures will you put in place to manage ongoing security of the banking industry resources

  Create a driver class called rollingdice-two

Using the Die class defined in this chapter, write a class called PairOfDice, composed of two Die objects. Include methods to set and get the individual die.

  Identifying and explaining the key components of a

identifying and describing the key components of a comprehensive disaster recovery plan for any incident that could

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd