Case Study 1: Bring Your Own Device (BYOD)

label Computer Science
account_circle Unassigned
schedule 1 Day
account_balance_wallet $5

  1. Analyze in detail the major risks surrounding BYOD, and analyze the security controls and technologies that are currently available and being utilized to manage these risks.
Jan 24th, 2015

Thank you for the opportunity to help you with your question!

There are both benefits and risks surrounding BYOD. The good news is that these risks can be managed.

Some of the risks include the fact that users are able to bypass network rules, which usually are only enforced on wired LANs.  In addition, they can access inappropriate content onsite if the device they are using doesn't meet the network. If a device does meet the network, it also brings with it insecurities such as malware, spyware, etc.  Bandwidth can also be drained when people access games, apps, and more.  Mobile devices are also insecure endpoints in the world of USB sticks and cloud backups.  Personal and private date can also be mixed, and tech support can have all sorts of problems and levels of support for diverse users.

The first thing that companies should do to lower the risk is get together and develop a clearly-defined policy.
Also, manage the point where the device meet the network.

Please let me know if you need any clarification. I'm always happy to answer your questions.
Jun 13th, 2015

Did you know? You can earn $20 for every friend you invite to Studypool!
Click here to
Refer a Friend
...
Jan 24th, 2015
...
Jan 24th, 2015
Oct 17th, 2017
check_circle
Mark as Final Answer
check_circle
Unmark as Final Answer
check_circle
Final Answer

Secure Information

Content will be erased after question is completed.

check_circle
Final Answer