"Bring Your Own Device (BYOD)

Computer Science
Tutor: None Selected Time limit: 1 Day

  • Identify three (3) risks that might result from implementing a BYOD policy. Suggest a method for mitigating each risk you have identified. Provide a rationale for your response.
Aug 2nd, 2015

Thank you for the opportunity to help you with your question!

Three risks that might affect integrity of an organization include:

1) Lost and stolen devices

2) Increased Data acsess

3) Malicious apps or malware

Solutions:

1) Password protection, encryption and available methods to wipe data once device is lost.

2) Monitor and store data on regular basis while keeping device free from important information

3) Restrict yourself to only trusted applications with updated antivirus/antimalware installed on your device

Please let me know if you need any clarification. I'm always happy to answer your questions.
Aug 2nd, 2015

Studypool's Notebank makes it easy to buy and sell old notes, study guides, reviews, etc.
Click to visit
The Notebank
...
Aug 2nd, 2015
...
Aug 2nd, 2015
Dec 3rd, 2016
check_circle
Mark as Final Answer
check_circle
Unmark as Final Answer
check_circle
Final Answer

Secure Information

Content will be erased after question is completed.

check_circle
Final Answer