Perform necessary research to understand working principle

Assignment Help Other Subject
Reference no: EM132565822

Part Description

You are hired by Southern Cross University as a cybersecurity consultant to work on a security program to address the contemporary and emerging risks from the cyber threats the university is facing. Your tasks are the following:

Part 1: the university is currently using a password based authentication system to control the user access to the university's information system. However, the Bring Your Own Device (BYOD) policy recently implemented by the university has raised some security concerns. As there is no SCU BYOD policy given, you can include as one of your assumptions that the SCU BYOD policy was developed in line with the Australian Cyber Security Centre guidelines that have been provided. As a security consultant, assess the risk from the BYOD policy to the university's information system.

Part 2: After the assessing the risk from the BYOD policy, you suggest the university to replace the current password-based authentication scheme with a Certificate-Based Authentication. To justify your suggestion, write a technical report to explain the working principle of the Certificate-Based Authentication mechanism and discuss why the university should use the mechanism in this case by comparing it with the password-based authentication mechanism. Use figure when necessary to support your answers.

Part 3: You have identified Spamming is among the top cybersecurity threats facing by the university. Use the Spam Act 2003 and available online resources to develop a guideline for the university students and staff to combat with the threat. The guideline will include the following:
• Definition of spam and its distinctive characteristics.
• At least three (3) real examples of spams showing the spam characteristics.
• An instruction to the users of how to recognise and safely handle a spam.
• An instruction to the IT administrator of how to minimize the spam threat

Part 1: BOYD risk assessment

To complete this task, use the following guidelines:

Identify the most critical components of the university's information system - the critical information assets.

Identify what threats the BYOD policy may bring to the identified critical assets.

Identify potential vulnerabilities of each asset against the identified threats.

Assess the risk to the university's information system using either quantitative or qualitative risk assessment approach and document the risk assessment process.

Part 2: Certificate-based Authentication

To complete this task, use the following guidelines:

Perform necessary research to understand the working principle, pros and cons of the Certificate-based Authentication mechanism. Document all reference sources.

Write a technical report to explain the working principle of the Certificate-based Authentication mechanism. Compare the certificate-based authentication against the password-based authentication and highlight the features you think are useful for combating the threats from the BYOD policy.

Note that you are not allowed to cut and pastefrom online resources. Use your own words and figures. Acknowledge all reference sources.

Part 3: Anti-spam Guideline

To complete this task, use the following guidelines:

Read and understand Spam Act 2003. The Spam Act 2003

The Act will help you to define what type of electronic messages should be treated as spams, what are the distinctive characteristics of a spam and what act is considered as spamming?

Search for 3 representative examples of spams or use your own spams as examples.

Use samples from reputable online resources to help you with the development of spam handling instructions. The instructions should be clear, concise and precise.

Attachment:- Cybersecurity task.rar

Reference no: EM132565822

Questions Cloud

What firm degree of combined leverage of la cucaracha : The firm's operating leverage is 2.68. What is the firm's degree of combined (total) leverage of La Cucaracha Pest Control, Inc. ?
Difference between reproduction and development : 1) What is the difference between reproduction and development?
How to determine what is the price of the bonds : A company issues bonds, The bonds mature in 8 years, have a face value of $1,000 and a yield to maturity of 8.5%. What is the price of the bonds?
Applicability of the hardy-weinberg criteria : Describe the bug population change results during this data run in terms of genotypes and phenotypes.
Perform necessary research to understand working principle : Identify the most critical components of the university's information system - the critical information assets. Identify what threats the BYOD policy may bring
Build a cell wall a better choice for an antibiotic : Why is a drug that blocks a cell's ability to build a cell wall a better choice for an antibiotic
Prepare the ncessary adjusting entries for december : Eversure Hosptial's preadjusted trial balance, Prepare, in general journal form, the ncessary adjusting entries for December 31, 20X1
Factors impact the size of the population : affect the population size based off the equation, and explaining how these factors impact the size of the population.
How to compute what is the net present value of the project : Risk-free investments is 3% and that the expected rate of return on the market portfolio is 16%, what is the net present value of the project?

Reviews

Write a Review

Other Subject Questions & Answers

  Describe the reasons why ethics are so important

There is an endless amount of reasons why ethics are so important. For starters, it is because there is so much opportunity for corruption, theft.

  What is the emotional gridlock

Speak about the Couple's Reactivity and give examples.How does either of the spouses attempt to tolerate pain for growth?

  What role will medical informatics professionals play in chi

What role will medical informatics professionals play in CHI? What are some of the barriers to the growing role of CHI?

  What is the t-critical and degrees of freedom for this test

Explain why we use pooled variance. Stating that we need it for the standard error is not sufficient. Explain conceptually why the variation in the 2 groups is combined for the statistical test.

  Review core competencies of the different roles of the nurse

Compare the core competencies of the Nurse Practitioner's role (direct care provider) in contrast to the core competencies of the NurseAdministrator's role (indirect care provider) .Analyze the similarities and differences in implementation of the ..

  Emile durkheim asserted the authority of social facts

Emile Durkheim asserted the authority of social facts is coercion by reason. Please explain and discuss using three examples from daily life, today.

  Explain how you would continue the process of scientific

In two or three sentences, explain how you would continue the process of the scientific method if your original hypothesis was incorrect.How do independent and controlled variables (discussed in the video) fit into your idea of how to continue?In tw..

  What was the impact of early european exploration on america

What was the impact of early European exploration and colonization on the Americas? Be sure to address both the positives and negatives of this time period.

  Hat can each do to try to reach out beyond their base

Do these elected leaders have any more personal or social responsibility to the citizens and residents of the USA than the average Facebook user?

  What maximum length of aluminum foil

Rolls of aluminum foil are 305mm wide and 0.013mm thick. What maximum length of aluminum foil can be made from 1.29kg of aluminum?( d(aluminum)=2.70 g/cm3)

  Evaluate the validity and reliability on the article

Assess strategies for addressing ethical concerns in the design of a research study.

  How laws or regulations affect your past or current job

Develop a 1,050-word summary contrasting law and ethics describing the following: Describe how laws or regulations affect your past or current job or industry

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd