• Home
  • Blog
  • CMP71001 – You are hired by Southern Cross University as a cybersecurity consultant to work on… 1 answer below »

CMP71001 – You are hired by Southern Cross University as a cybersecurity consultant to work on… 1 answer below »

0 comments

HIRE QUALIFIED ACADEMIC WRITERS 

You are hired by Southern Cross University as a cybersecurity consultant to work on asecurity program to address the contemporary and emerging risks from the cyber threatsthe university is facing. Your tasks are the following:? Task 1: the university is currently using a password based authentication systemto control the user access to the university’s information system. However, theBring Your Own Device (BYOD) policy recently implemented by the universityhas raised some security concerns. As there is no SCU BYOD policy given, youcan include as one of your assumptions that the SCU BYOD policy was developedin line with the Australian Cyber Security Centre guidelines that have beenprovided. As a security consultant, assess the risk from the BYOD policy to theuniversity’s information system.? Task 2: After the assessing the risk from the BYOD policy, you suggest theuniversity to replace the current password-based authentication scheme with aCertificate-Based Authentication. To justify your suggestion, write a technicalreport to explain the working principle of the Certificate-Based Authenticationmechanism and discuss why the university should use the mechanism in this caseby comparing it with the password-based authentication mechanism. Use figurewhen necessary to support your answers.? Task 3: You have identified Spamming is among the top cybersecurity threatsfacing by the university. Use the Spam Act 2003 and available online resources toCMP71001-Cybersecurity Assignment-2, S3 20192develop a guideline for the university students and staff to combat with the threat.The guideline will include the following:o Definition of spam and its distinctive characteristics.o At least three (3) real examples of spams showing the spam characteristics.o An instruction to the users of how to recognise and safely handle a spam.o An instruction to the IT administrator of how to minimize the spam threat.Attachments:CMP71001-Assi….pdf

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}