Task Description You are hired by the organisation, such as Southern Cross University, selected in Ass1, as a cybersecurity consultant to work on a security program to address the contemporary and...

1 answer below »
Task Description

You are hired by the organisation, such as Southern Cross University, selected in Ass1, as a cybersecurity consultant to work on a security program to address the contemporary and emerging risks from the cyber threats the organisation is facing. Your tasks are the following:

• Task 1: the organisation is currently using a password based authentication system to control the user access to the organisation’s information system. However, the Bring Your Own Device (BYOD) policy recently implemented by the organisation has raised some security concerns. As a security consultant, assess the risk from the BYOD policy to the organisation's information system.

• Task 2: After the assessing the risk from the BYOD policy, you suggest the organisation to replace the current password-based authentication scheme with a Certificate-Based Authentication for both device and user authentication. To justify your suggestion, write a technical report to explain the working principle of the Certificate-Based Authentication mechanism and discuss why the organisation should use the mechanism in this case by comparing it with the password-based authentication mechanism. Use figure when necessary to support your answers.

• Task 3: You have identified "Phishing" is among the top cybersecurity threats facing by the organisation. Use available online (e.g., Internet) resources to develop a guideline for the organisation staff to combat with the threat. The guideline will include the following:

o Definition of phishing and its distinctive characteristics.

o At least three (3) real examples showing the phishing characteristics.

2

o An instruction to the users of how to recognise and safely handle a phishing attack.

o An instruction to the IT administrator of how to minimise the phishing threat.

Assignment-2 guideline

Task 1: BOYD risk assessment

To complete this task, use the following guidelines:

• Identify the most critical components of the organisation information system - the critical information assets.

• Identify what threats the BYOD policy may bring to the identified critical assets.

• Identify potential vulnerabilities of each asset against the identified threats.

• Assess the risk to the organisation information system using either quantitative or qualitative risk assessment approach and document the risk assessment process.

Task 2: Certificate-based Authentication

To complete this task, use the following guidelines:

• Perform necessary research to understand the working principle, pros and cons of the Certificate-based Authentication mechanism. Document all reference sources.

• Write a technical report to explain the working principle of the Certificate-based Authentication mechanism. Compare the certificate-based authentication against the password-based authentication and highlight the features you think are useful for combating the threats from the BYOD policy for device and user authentication at the same time.

• Note that you are not allowed to cut and paste from online resources. Use your own words and figures. Acknowledge all reference sources.

Task 3: Anti-phishing guideline

To complete this task, use the following guidelines:

• Read online resources, such as Black (2005) “Phish to Fry: Responding to the Phishing Problem”. Journal of Law and Information Science, 16(1), pp. 73-91 (http://classic.austlii.edu.au/au/journals/JlLawInfoSci/2005/4.html), AntiPhishing Working Group (https://www.antiphishing.org/resources/), etc. to define what type of electronic messages should be treated as phishing, what are the distinctive characteristics of a phishing and what act is considered as phishing?

• Search for 3 representative examples of phishing or use your own phishing as examples.

• Use samples from reputable online resources to help you with the development of phishing handling instructions. The instructions should be clear, concise and precise.

3

Assignment-2 Marking Rubric The following marking rubric will be used for the marking of your submission. It contains a detailed breakdown of the marking criteria for this assignment. Make sure you read CAREFULLY this to understand how your work would be graded against each of the defined criteria.

Criteria

Mark break down

Note to the student

Task1 12

Identify the most critical components of the organisation information system - the critical information assets

3

Access control is a critical component of any information system. WFA can help to identify the most critical component. If you don't use WFA, provide arguments to justify your choice of the critical components.

Identify what threats the BYOD policy may bring to the identified critical assets

3

Do not bring in any threats. Think about BYOD policy.

Identify potential vulnerabilities of each asset against the identified threats

3 Use TVA worksheet to document this process.

Assess the risk to the organisation information system. 3

You can use either quantitative or qualitative risk assessment method. Task 2 10

Clearly explains the working principle of the certificatebased authentication.

3

Compare and contrast the certificate-based authentication and password-based authentication for device and user authentication.

3

Correctly identify and highlight the useful features of the certificate-based device and user authentication for BYOD policy.

3

Quality of references

1

Reference from reputable sources e.g. textbook, research papers, technical reports.

Task 3 7

Correctly identify the characteristics of a phishing act. 2

Provide three representative examples of phishing 2 Phishing handling instruction 3 Documentation 1

4

Professional presentation. 1 Arguments are well and logically supported; Correct grammars and spelling. Total 30 Submission Format

When you have completed the assignment, you are required to submit your assignment in the PDF/DOC format. The file will be named using the following convention: filename = FirstInitialYourLastName_CMP71001_A2_S2_2019.pdf (i.e. DJones_CMP71001_A2_S2_2019.pdf)
Answered Same DaySep 08, 2021CMP71001Southern Cross University

Answer To: Task Description You are hired by the organisation, such as Southern Cross University, selected in...

Jayageetha answered on Sep 16 2021
129 Votes
Security consultation report and guideline
Name
ID
Date
Summary
In the era of internet, protecting individual identity has become inevitable for an organization to bring in user integrity. Business entities, universities and other organizations find this task challenging and are coming up with suitable technological and real time solutions. Assessing the r
isks associated with identity thefts and threats is important to find a feasible remedy. The report carries information about knowing such risks, handling them and anti-phishing guidelines
Table of Contents
Introduction
1. BOYD Risk Assessment
1.1 BYOD Risk assessment Introduction
1.2 Objective/Purpose of BYOD Risk assessment
1.3 Scope of Risk Assessment
1.4 Risk assessment approach
1.5 Critical components (Asset Identification) and WFA
1.6 Define risk appetite
1.7 Threats and Vulnerabilities identification and TVA
1.8 Risk Assessment (Qualitative /quantitative)
2. Certificate Based Authentication
2.1 Introduction
2.2 Working principle of Password-based authentication scheme
2.3 Certificate-based authentication scheme
2.3 Working principle of Certificate-based authentication scheme
2.4 Comparison of the username-password and certificate–based Authentication
3. Anti-phishing Guideline
3.1 Definition and characteristics of Phishing
3.2 Representative Examples of Phishing
3.3 Instructions for Phishing Handling (users)
3.4 Instructions for Phishing Handling (IT admin)
4. Conclusion
1. BYOD Risk Assessment
1.1 BYOD Risk assessment Introduction
Password authentication system to access the critical information assets of an organization is largely losing its ground, after the introduction of Bring Your Own Device (BYOD) as it might pose greater threat to the organization’s sensitive information. Understanding the risks in BYOD on par with password authentication system becomes a prerequisite before looking for an alternative. Though importance of BYOD was first understood by Intel in 2009 (Group, 2019), it was only in 2011, the concept became a reality. Later, the it gave way to Bring Your Own Technology (BYOT) and Bring Your Own Software (BYOS), thereby posing security challenges to the inherent information system.
1.2 Objective of BYOD Risk assessment
BYOD gives us the convenience of using our own personal device inside the organization but the threats posed by it outnumber the advantages. Critical information assets are under greater risk. Hence it becomes important to safeguard the vital information with a better technology
1.3 Scope of Risk assessment
Risk assessment in this context, is confined to critical information assets of an organization which may include, access control, personal information ledger, access to academic resources, Copywrites, Intellectual Property rights, Published papers and Patents, vital data, backups, etc.,
1.4 Risk assessment approach
Firstly, the critical information assets in the organization are to be identified and then ordered based on the impact the organization will have, on trespassing. Ordering them using Weighted Factor Analysis (WFA)gives a close to perfect report. Then the assets are to be analysed for threats and vulnerabilities using Threats-Vulnerabilities-Assets worksheet followed by a qualitative or quantitative risk assessment.
1.5 Critical Information Asset Identification and WFA
Weighted Factors Analysis (WFA) is the overall weightage given to a problem (classified into various criteria) based on the impact it has on the business. (ScienceDirect, n.d.). Listing the assets in the order of the most critical one to the least...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here