logo

Challenges for BYOD in IT Network

   

Added on  2023-04-05

6 Pages934 Words283 Views
Running head: BRING YOUR OWN DEVICE
Bring Your Own Device
Name of the Student
Name of the University
Author Note:
Challenges for BYOD in IT Network_1
1BRING YOUR OWN DEVICE
Introduction
BYOD stands for bringing your own device is known to be as one of the rapidly growing
businesses which is very much concerned with information technology (Lee Jr et al. 2017). It
aims to provide a list of security concern which needs to be considered for implementing policies
of BYOD. There is some recent publication of proper awareness of various kind of risk which is
there involved in incorporation of BYOD in business (Dawson 2016). It is considered to be as
one of the underrated problem which is compared with other IT security concerns.
In the coming pages of the essay, an idea has been provided with respect to two key
challenges for BYOD in IT-based network. There is mainly two kinds of challenges like
technical challenges and policy and regulation challenges.
Discussion
Technical Challenges
Access Control: This particular challenge coincides with the deployment challenge.
Organization needs to understand the permission level for each of the given employee at the time
of accessing the resources. It can be both within the personal device and connection within the
external network (Keyes 2016). There are some other factors which help in understanding the
access control which comes up with time limits. The fact is all about limiting the number of
people who can gain easy access to resources at the given instance. It is all about understanding
the fact that how employee can easily gain access to the resources of the organization. Problem-
related to access control can vary as per the size of the business and number of employees in the
industry.
Challenges for BYOD in IT Network_2
2BRING YOUR OWN DEVICE
Providing ongoing Support: There is huge number of policies for BYOD which look
for some extra resources for maintaining the level of security of devices connected in a network.
There is huge amount of responsibilities of various security professionals so that they meet the
increasing need (Agudelo et al. 2016). BYOD security solution needs proper commitment and
money at the time of development.
Maintaining secure and stable connection: The main focus is on the corporate network
resources and devices which is connected to through external network. It is considered to be
common issue for BYOD business (Dhingra 2016). There is some wireless access point which
contains threats like malware that can install on device.
Protecting organization data which is stored in cloud: It is a sensitive issue as the
cloud application can help data to be accessed at any anytime. It can be used as an alternative
form which removes the need for storing data on various mobile devices (Cheng, Guan & Chau
2016). When the cloud-based storage is accessed from various mobile devices it can result in
various kind of security threats similar to the device like hacking and software-based attacks.
Challenges for BYOD in IT Network_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
SECURITY THREATS RELATED TO BYOD DEVICES AND COUNTERMEASURES.
|3
|432
|38

IT Infrastructure Management - Desklib
|7
|1577
|102

Policy of Bring Your Own Device - Vodafone
|4
|914
|70

Bring Your Own Devices (BYOD).
|1
|811
|1

Information security assignment : BYOD
|11
|2834
|32

Cyber Security: Risks and Solutions for South Cross University
|12
|2052
|467