CMP71001: Cybersecurity S2/2018Student: CriteriaMarksMark breakdownMarkReceivedFeedbackNote to the studentNote to the markerTask112partial marks of 0.5(s) can be given toincomplete but correct answersIdentify the most critical components ofthe university’s information system – thecritical information assets3Access control is a critical component of anyinformation system. WFA can help to identify themost critical component. If you don’t use WFA,provide arguments to justify your choice of thecritical components.Identify what threats the BYOD policy maybring to the identified critical assets3Do not bring in any threats. Think about BYOD policy.Identify potential vulnerabilities of eachasset against the identified threats3Use TVA worksheet to document this process.Assess the risk to the university’sinformation system.3You can use either quantitative or qualitative riskassessment method.Task 210Clearly explains the working principle ofthe certificate-based authentication.3Compare and contrast the certificatebased authentication and password-basedauthentication.3Correctly identify and highlight the usefulfeatures of the certificate-basedauthentication for BYOD policy.3Quality of references1Reference from reputable sources e.g. textbook,research papers, technical reports.Task 38Correctly identify the characteristics of aSpam and Spamming act.2Provide three representative examples ofSpams3Spam handling instruction3Total300General feedback: Assignment-2 Marking Guide