Description
U7A1Analyze network security threats, risks, and solutions presented by mobile devices in BYOD workplaces.
Do the following:
- Analyze three common security threats for enterprises employing a BYOD policy.
- Explain the risk factors associated with mobile device security threats.
- Analyze how two significant features of a specific mobile OS keep their devices secure
Explanation & Answer
Hey I am through. Please find the correct answer in the attached word file. Thank you.
Running head: SECURING AN OPERATING SYSTEM
Securing an Operating System
Name
Course
Instructor
Institution
Date
1
SECURING AN OPERATING SYSTEM
2
Despite BYOD (Bring your own device) having enabled greater flexibility and maximized
productivity, it has also led to a change in IT usage in cases where mobile devices interact with
corporate data. This mobility has created numerous security threats and risks with data security
being the greatest concern.
Common Security Threats and Risks
BYOD Increases the risk of data loss or leakage
Mobile devices like smartphones and tablets form the weakest security link and are
susceptible to attacks. These devices need consistent patch updates; a responsibility usually
delegated to the device owner (employees). The threats and risks can be minimized and mitigated
through the deployment of acceptable user policies and measures that precisely state the
restrictions as well as actions to be taken when violated (Gupta, Sharman, & Walp 2017).
Loss of device control
Organizations are having less control over mobile devices used within their networks
which increases vulnerability to attacks. The staff in this organizations download mobile device
apps from untrusted ...