application security discussion week 3 sharath

User Generated

tbjgunzz

Computer Science

Description

As the IoT (Internet of Things) grows, and users access corporate data with personal devices, companies are stuck balancing the ethical line between security with privacy. In regards to MDM systems and BYOD policies, answer the following questions:

  • Is it OK to read employees' e-mail as a security measure to ensure that sensitive company information isn't being disclosed?
  • Should you have access to those emails and files on a personal device that is accessing the company data via a 3rd party app (i.e. Outlook Mobile, or iOS default mail program)?
  • If you do read employees' e-mail, should you disclose that policy to them? Before or after the fact?
  • Is it OK to read the documents and look at the graphics files that are stored on users' computers or in their directories on the file server? On their mobile device?

For this week, you need to respond to 2 of your peer's initial responses. Your replies need to be more than 1 or 2 sentences to obtain credit for posting. Describe how you agree or disagree with their post. Add to their post, but do not attack their position. These are ethical questions with no right or wrong answer. In total, you need to have more than 3 posts (your initial and 2 replies to receive full credit).

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hey! Kindly find the attached answer and in case of any issue, let me know. Thank you and all the best

Application Security Discussion
by Booth T

Submission date: 25-Jan-2019 09:51AM (UT C-0500)
Submission ID: 1068417011
File name: Application_Security_Discussion.docx (34.03K)
Word count: 508
Character count: 3020

Application Security Discussion
ORIGINALITY REPORT

4

%

SIMILARIT Y INDEX

4%

0%

4%

INT ERNET SOURCES

PUBLICAT IONS

ST UDENT PAPERS

PRIMARY SOURCES

1

4%

techgenix.com
Int ernet Source

Exclude quotes

On

Exclude bibliography

On

Exclude matches

Of f


Running head: APPLICATION SECURITY DISCUSSION

Application Security Discussion
Student’s Name
Institution

Date

1

APPLICATION SECURITY DISCUSSION

2

Advancement in technology and the emergence of new technologies such as the internet o...


Anonymous
Great! 10/10 would recommend using Studypool to help you study.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags