Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Homework Help/Study Tips Expert

Task Description

You are hired by Southern Cross University as a cybersecurity consultant to work on a security program to address the contemporary and emerging risks from the cyber threats the university is facing. Your tasks are the following:

Task 1: the university is currently using a password based authentication system to control the user access to the university's information system. However, the Bring Your Own Device (BYOD) policy recently implemented by the university has raised some security concerns. As a security consultant, assess the risk from the BYOD policy to the university's information system.

Task 2: After the assessing the risk from the BYOD policy, you suggest the university to replace the current password-based authentication scheme with a Certificate-Based Authentication. To justify your suggestion, write a technical report to explain the working principle of the Certificate-Based Authentication mechanism and discuss why the university should use the mechanism in this case by comparing it with the password-based authentication mechanism. Use figure when necessary to support your answers.

Task 3: You have identify Spamming is among the top cybersecurity threats facing by the university. Use the Spam Act 2003 and available online resources to develop a guideline for the university students and staff to combat with the threat. The guideline will include the following:

o Definition of spam and its distinctive characteristics.

o At least three (3) real examples of spams showing the spam characteristics.
o An instruction to the users of how to recognise and safely handle a spam.
o An instruction to the IT administrator of how to minimize the spam threat.

Assignment guideline

Task 1: BOYD risk assessment
To complete this task, use the following guidelines:
- Identify the most critical components of the university's information system - the critical information assets.
- Identify what threats the BYOD policy may bring to the identified critical assets.
- Identify potential vulnerabilities of each asset against the identified threats.
- Assess the risk to the university's information system using either quantitative or qualitative risk assessment approach and document the risk assessment process.

Task 2: Certificate-based Authentication
To complete this task, use the following guidelines:
- Perform necessary research to understand the working principle, pros and cons of the Certificate-based Authentication mechanism. Document all reference sources.
- Write a technical report to explain the working principle of the Certificate-based Authentication mechanism. Compare the certificate-based authentication against the password-based authentication and highlight the features you think are useful for combating the threats from the BYOD policy.
- Note that you are not allowed to cut and paste from online resources. Use your own words and figures. Acknowledge all reference sources.

Task 3: Anti-spam guideline
To complete this task, use the following guidelines:
- Read and understand Spam Act 2003. The Spam Act 2003 document is available at: https://www.legislation.gov.au/Details/C2016C00614. The Act will help you to define what type of electronic messages should be treated as spams, what are the distinctive characteristics of a spam and what act is considered as spamming?
- Search for 3 representative examples of spams or use your own spams as examples.
- Use samples from reputable online resources to help you with the development of spam handling instructions. The instructions should be clear, concise and precise.

Attachment:- Assignment.rar

Homework Help/Study Tips, Others

  • Category:- Homework Help/Study Tips
  • Reference No.:- M93113662
  • Price:- $120

Guranteed 48 Hours Delivery, In Price:- $120

Have any Question?


Related Questions in Homework Help/Study Tips

Senator cruz recently suggested - perhaps as a joke - that

Senator Cruz recently suggested - perhaps as a joke - that Beto O'Rourke wants to ban BBQ. Want you imagine that he's won the election and you've been asked to develop a plan for implementing this ban. How could this be ...

In the incidents in the life of slave girlmary church

In The Incidents in The Life of Slave Girl,Mary Church Terrell concludes her speech stating, "And so, lifting as we climb, onward and upward we go, struggling and striving, and hoping that the buds and blossoms of our de ...

Question what main resources would you need to integrate an

Question: What main resources would you need to integrate an academic electronic health record in healthcare simulations (with and without human patient simulators)? Include staff in the discussion. The response must be ...

Question some psychologists specialize in the study and

Question: Some psychologists specialize in the study and treatment of psychological disorders, such as schizophrenia, mood disorders, eating disorders, and anxiety disorders. For your presentation, research and explain v ...

Question theories of behavior timelinecomplete the

Question: Theories of Behavior Timeline Complete the following table by reordering the theorists according to the relevant date (and providing these dates), writing at least 90 words to describe what the particular theor ...

Assignment field experience - leadership and

Assignment Field Experience - Leadership and Collaboration Details: Complete two or more field experiences from the Focused Field Experience Activity List D: Focused Field Experience Activity List D: - Collaborate with f ...

Question define chief operating officer and chief

Question: Define: chief operating officer and chief information officer Abbreviations For the terms: COO CIO You are required to write a 2-3 paragraph explanation and/or definition of what the term or phrase means in a h ...

Assignment - hot spot tectonic shifthot spots are areas

Assignment - Hot Spot Tectonic Shift Hot spots are areas where hot magma from the mantle rises upward to produce occasional volcanic eruptions. As a tectonic plate shifts above the hot spot, the volcanic eruptions occur ...

By analyzing shaming and other innovative punishment

By analyzing shaming and other innovative punishment schemes with regard to dignity, mental anguish, and arbitrariness; some question if these types of sanctions violate an individual's Eighth Amendment right, banning cr ...

Question at least once a year the media report on a

Question: At least once a year, the media report on a seemingly healthy teenage athlete collapsing during a sports game and dying of heart complications. These incidents continue to outline the importance of physical exa ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As