This assignment is developmental and cumulative. You are strongly advised to start doing this assignment from Week-6 in your study. Leaving your starting date to the week before the due date is a very...

1 answer below »
This assignment is developmental and cumulative. You are strongly advised to start doing this assignment from Week-6 in your study. Leaving your starting date to the week before the due date is a very poor strategy for success in the unit.Marks A marking scheme will be posted on MySCU to help you direct your efforts successfully.
Task DescriptionYou are hired by Southern Cross University as a cybersecurity consultant to work on a security program to address the contemporary and emerging risks from the cyber threats the university is facing. Your tasks are the following: Task 1: the university is currently using a password based authentication system to control the user access to the university’s information system. However, the Bring Your Own Device (BYOD) policy recently implemented by the university has raised some security concerns. As a security consultant, assess the risk from the BYOD policy to the university's information system. Task 2: After the assessing the risk from the BYOD policy, you suggest the university to replace the current password-based authentication scheme with a Certificate-Based Authentication. To justify your suggestion, write a technical report to explain the working principle of the Certificate-Based Authentication mechanism and discuss why the university should use the mechanism in this case by comparing it with the password-based authentication mechanism. Use figure when necessary to support your answers. Task 3: You have identify Spamming is among the top cybersecurity threats facing by the university. Use the Spam Act 2003 and available online resources to develop a guideline for the university students and staff to combat with the threat. The guideline will include the following:o Definition of spam and its distinctive characteristics.2o At least three (3) real examples of spams showing the spam characteristics.o An instruction to the users of how to recognise and safely handle a spam.o An instruction to the IT administrator of how to minimize the spam threat.
Assignment-2 guidelineTask 1: BOYD risk assessmentTo complete this task, use the following guidelines: Identify the most critical components of the university's information system - thecritical information assets. Identify what threats the BYOD policy may bring to the identified critical assets. Identify potential vulnerabilities of each asset against the identified threats. Assess the risk to the university's information system using either quantitative orqualitative risk assessment approach and document the risk assessment process.Task 2: Certificate-based AuthenticationTo complete this task, use the following guidelines: Perform necessary research to understand the working principle, pros and cons ofthe Certificate-based Authentication mechanism. Document all reference sources. Write a technical report to explain the working principle of the Certificate-basedAuthentication mechanism. Compare the certificate-based authentication againstthe password-based authentication and highlight the features you think are usefulfor combating the threats from the BYOD policy. Note that you are not allowed to cut and paste from online resources. Use yourown words and figures. Acknowledge all reference sources.Task 3: Anti-spam guidelineTo complete this task, use the following guidelines: Read and understand Spam Act 2003. The Spam Act 2003 document is availableat: https://www.legislation.gov.au/Details/C2016C00614. The Act will help you todefine what type of electronic messages should be treated as spams, what are thedistinctive characteristics of a spam and what act is considered as spamming? Search for 3 representative examples of spams or use your own spams as examples. Use samples from reputable online resources to help you with the development ofspam handling instructions. The instructions should be clear, concise and precise.Assignment-2 Marking RubricA spreadsheet that will be used for the marking of your site is provided (co-located withthis assignment specification) on MySCU to itemise exactly what tutors will be looking atin relation to marking your assignment. It contains a detailed breakdown of the markingcriteria for this assignment. I strongly suggest you peruse this spreadsheet.3Submission FormatWhen you have completed the assignment, you are required to submit your assignment inthe PDF/DOC format. The file will be named using the following convention:filename = FirstInitialYourLastName_CMP71001_A2.pdf(i.e. FJones_CMP71001_A2.pdf)Note to IBS students: Please check with your local lecturer/tutor the submissionrequirements for your assignments. Typically, they will be different from on-shore studentsof Southern Cross University.Original workIt is a University requirement that a student’s work complies with the Academic Policy,Chapter 4.20 on Student Academic Integrity. It is a student’s responsibility to be familiarwith the Policy.Failure to comply with the Policy can have severe consequences in the form of Universitysanctions. For information on this Policy please refer to Chapter 4.20 on Student AcademicIntegrity at the following website:http://www.scu.edu.au/governance/academicboard/policy/As part of a University initiative to support the development of academic integrity,assessments may be checked for plagiarism, including through an electronic system, eitherinternally or by a plagiarism checking service, and be held for future checking andmatching purposes.Retain duplicate copyBefore submitting the assignment, you are advised to retain electronic copies of originalwork. In the event of any uncertainty regarding the submission of assessment items, youmay be requested to reproduce a final copy.School Extension PolicyIn general, I will NOT give extension unless where there are exceptional circumstances.Students wanting an extension must make a request at least 24 hours before the assessmentitem is due and the request must be received in writing by the unit assessor or designatedacademic. Extensions within 24 hours of submission or following the submission deadlinewill not be granted (unless supported by a doctor’s certificate or where there are exceptionalcircumstances – this will be at unit assessor’s discretion and will be considered on a caseby case basis). Extensions will be for a maximum of 48 hours (longer extensions supportedby a doctor’s certificate or alike to be considered on a case by case basis).A penalty of 5% of the total available grade will accrue for each 24-hour period that anassessment item is submitted late. Therefore, an assessment item worth 20 marks will have1 marks deducted for every 24-hour period and at the end of 20 days will receive 0 marks.Students who fail to submit following the guidelines in this Unit Information Guide will bedeemed to have not submitted the assessment item and the above penalty will be applied4until the specified submission guidelines are followed.Marks and FeedbackAll assessment materials submitted during the semester will normally be marked andreturned within two weeks of the required date of submission (provided that the assessmentmaterials have been submitted by the due date).Marks will be made available to each student via the MySCU Grade book.
Answered Same DaySep 16, 2020CMP71001Southern Cross University

Answer To: This assignment is developmental and cumulative. You are strongly advised to start doing this...

Kuldeep answered on Sep 20 2020
141 Votes
Running head: BYOD Policy
BYOD Policy
BYOD policy
Student Name
University Name
Unit Name
Unit Code
Contents
Introduction    2
Task1    2
Assess the risk from the BYOD policy to the university's information system    2
Task 2    3
Working principle of the Certificate-Based Authentication mechanism    3
Why the university should use the mechanism    4
Task 3    5
References    9
Introduc
tion
As a network security consultant at Southern Cross University, I wrote this report, working on a security program to address the contemporary and emerging risks of cyber threats facing universities. A complete BYOD safety framework includes people, policies, technology, and management should be advanced to address the security issues and make sure that university information systems can deliver the benefits of BYOD.
Task1
Assess the risk from the BYOD policy to the university's information system
Critical components of the university's information system: While BYOD offers a number of benefits; it also presents challenges involving information technology leaders and information security managers. Managing BYOD security, defining the acceptable uses of employees and organizations, and retrieving data from personal devices are key issues in implementing BYOD or the university information system being considered for implementation. Legoland Privacy issues are also required to be strategically addressed to make sure an effective BYOD program, as the BYOD comprises organizing data and protect data that employees reside on their personal devices.
Threats the BYOD policy may bring to the identified critical assets: There are some challenges in adopting BYOD. Adequate security, corporate data protection on the personal devices, privacy/legal issues, and employee compliance with the BYOD strategies are few of challenges to consider. Lack of the comprehensive framework or policy for implementing BYOD further complicates its adoption.
Potential vulnerabilities and risk to the university's information system
Increases risk of data leakage: As universities increasingly rely on the mobile devices, barriers to data leakage as well as threats open up, leading to greater dependence on the IT to protect mobile devices. Tablets and Mobile phones are the weakest link in terms of security and are vulnerable to attacks. They also need to update the patches regularly, and these responsibilities fall into the hands of employees.
Exploits vulnerabilities: CIOs have not as much of control over the mobile devices utilized by universities, which eventually means that they are much vulnerable. The employee is downloading the mobile app and connecting to an exterior Wi-Fi point without the precise security protocol. 
Mixing personal and business data: Most obvious BYOD safety challenges are to handle the storing of personal and corporate data on the similar device. Eventually, some kinds of the data will be revealed throughout the university, so the topic of protecting these data needs to be considered.
Task 2
Working principle of the Certificate-Based Authentication mechanism
Certificate-based authentication uses digital certificates to identify users, machines, or devices before granting access to resources, networks, applications, and so on. In the case of user verification, it is usually arranged in a coordinated manner with traditional systems, for example,password and username.
One difference amid certificate-based verification is that unlike some user-only solutions (for example, one-time passwords (OTPs) and biometrics), the similar solution may be utilized for entire endpoints - users, devices, machines and even developing Internet Things (IoT). The Certificate-based verification is very flexible and may be utilized in a variety of ways. There is a common theme of...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here