Case Study 1: Bring Your Own Device (BYOD)

Computer Science
Tutor: None Selected Time limit: 1 Day

  1. Analyze in detail the major risks surrounding BYOD, and analyze the security controls and technologies that are currently available and being utilized to manage these risks.
Jan 24th, 2015

Thank you for the opportunity to help you with your question!

There are both benefits and risks surrounding BYOD. The good news is that these risks can be managed.

Some of the risks include the fact that users are able to bypass network rules, which usually are only enforced on wired LANs.  In addition, they can access inappropriate content onsite if the device they are using doesn't meet the network. If a device does meet the network, it also brings with it insecurities such as malware, spyware, etc.  Bandwidth can also be drained when people access games, apps, and more.  Mobile devices are also insecure endpoints in the world of USB sticks and cloud backups.  Personal and private date can also be mixed, and tech support can have all sorts of problems and levels of support for diverse users.

The first thing that companies should do to lower the risk is get together and develop a clearly-defined policy.
Also, manage the point where the device meet the network.

Please let me know if you need any clarification. I'm always happy to answer your questions.
Jun 13th, 2015

Studypool's Notebank makes it easy to buy and sell old notes, study guides, reviews, etc.
Click to visit
The Notebank
...
Jan 24th, 2015
...
Jan 24th, 2015
Dec 6th, 2016
check_circle
Mark as Final Answer
check_circle
Unmark as Final Answer
check_circle
Final Answer

Secure Information

Content will be erased after question is completed.

check_circle
Final Answer