This assignment will enlighten on the risk assessment of Southern Cross University. The common risks faced by the university in maintaining the information systems is discussed in the assignment. To manage risks, the university is using a password based authentication system so that the access to the university’s information system can be restricted and controlled. However, the BYOD (Bring Your Own Device) policy is posing great threats to the university. The following paragraphs will deal with risk assessment of the BYOD policy to the university’s information system, the advantages of Certificate based authentication over password-based authentication followed by providing a guideline for anti-spamming.
The critical information assets of Southern Cross University are software tools, Data governance, Master data governance and financial policies. The software tools are required to protect the data assets of the university by facilitating data governance. The university has adopted various data governance software tools and technology to keep the data confidential.
The potential threats that arises from Bring your own device policy to information assets of universities are as follows:
Potential vulnerabilities of each assets against the identified threats: As discussed the critical information assets that are used by Southern Cross University are Software tools, Data governance, Master data governance and financial policies. The vulnerabilities of each assets are as follows:
Risks to the information system |
Threat source |
Threat Event |
Risk level |
Impact on the University |
Data theft and loss |
Malwares introduced in the network |
Malicious codes are introduced in the network through personal devices |
High |
Severe |
Network Breakdown |
Viruses introduced in the network |
Personal devices containing viruses contaminates the network. |
High |
Severe |
Violation of financial policies |
Malwares viruses and spams |
Malwares and viruses introduced in the network tampers with the financial data |
Extremely high |
Severe |
Trouble for students |
Malwares viruses and spams |
Unauthorized access to the university’s data might lead to loss of data that will place the students in trouble |
Medium |
Low |
In certificate-based authentication, digital certificate is used to identify a user, machine or device. Before providing access to the user, device or machine to the resources, networks and application it checks if the user is registered through certificates to access the network (Ahmavaar Palanigounder and Qualcomm, 2017). The certificates of the users are used to logon to windows, access emails and intranets as well as accessing the databases of the enterprise. Only approved users, devices and machines would be allowed to access the networks and databases.
The machines and devices are also authenticated by using digital certificates. The on-location or in- field machines should be identified and communicated to the back-end services (Hummen et al., 2013). The personal devices like smart phones, laptops and tablets should be identified before access is allowed to Wi-Fi networks. Mutual certificate-based authentication between various servers of the enterprise is enabled (Xue et al., 2013).
Certificate-based authentication is better than password-based authentication due to some differences between them. The differences between them are as follows:
Some features of certificate-based authentication are mentioned below:
Unsolicited messages are regarded as spams. Commercial electronic messages that are unsolicited cannot be sent. The electronic messages should contain information of the organization or individual who is authorized for sending the message (Kigerl, 2015). Otherwise, the message will be marked as spam. The various forms of spam that are email spams, web search engine spam, online classified ads spam, UseNet newsgroup spam, social spam, mobile apps spam and so on.
Spamming is the use of messaging systems to send spams (unsolicited messages). Repeated messages sent to a site is also referred to as spamming. The characteristics of spamming are explained in the following paragraphs:
Spam is a growing problem in today’s world and needs a solution. Therefore, the following guidelines will help to reduce spam risks:
Conclusion:
From the above discussions, it can be concluded that Southern Cross University’s information system is facing threats from malwares, viruses and spam that might occur from ‘bring your own device’ policy. However, if certificate-based authentication is used in the university, then unauthorized access to the network can be controlled. Spams are bulk messages that are sent through either emails or social media. However, anti-spam guidelines will help to reduce the threats.
Reference:
Cao, C. and Caverlee, J., 2015, March. Detecting spam urls in social media via behavioral analysis. In European Conference on Information Retrieval (pp. 703-714). Springer, Cham.
Farash, M.S. and Attari, M.A., 2016. An anonymous and untraceable password?based authentication scheme for session initiation protocol using smart cards. International Journal of Communication Systems, 29(13), pp.1956-1967.
He, D. and Wang, D., 2015. Robust biometrics-based authentication scheme for multiserver environment. IEEE Systems Journal, 9(3), pp.816-823.
Hummen, R., Ziegeldorf, J.H., Shafagh, H., Raza, S. and Wehrle, K., 2013, April. Towards viable certificate-based authentication for the internet of things. In Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy (pp. 37-42). ACM.
Idris, I., Selamat, A., Nguyen, N.T., Omatu, S., Krejcar, O., Kuca, K. and Penhaker, M., 2015. A combined negative selection algorithm–particle swarm optimization for an email spam detection system. Engineering Applications of Artificial Intelligence, 39, pp.33-44.
Kigerl, A.C., 2015. Evaluation of the CAN SPAM ACT: Testing deterrence and other influences of e-mail spammer legal compliance over time. Social Science Computer Review, 33(4), pp.440-458.
Phokeer, A. and Aina, A., 2016, May. A survey of anti-spam mechanisms and their usage from a Regional Internet Registry’s perspective. In IST-Africa Week Conference, 2016 (pp. 1-11). IEEE.
Rothwell, S., Elshenawy, A., Carter, S., Braga, D., Romani, F., Kennewick, M. and Kennewick, B., 2015. Controlling quality and handling fraud in large scale crowdsourcing speech data collections. In Sixteenth Annual Conference of the International Speech Communication Association.
Turkanovic, M. and Holbl, M., 2013. An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Elektronika ir Elektrotechnika, 19(6), pp.109-116.
Wu, S., Chen, K. and Zhu, Y., 2013. Enhancements of a three-party password-based authenticated key exchange protocol. Int. Arab J. Inf. Technol., 10(3), pp.215-221.
Xue, K., Ma, C., Hong, P. and Ding, R., 2013. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications, 36(1), pp.316-323.
Youn, S. and Cho, H.C., 2015. Improved spam filter via handling of text embedded image e-mail. Journal of Electrical Engineering & Technology, 10(1), pp.401-407.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download