logo

Bring Your Own Device Policy - PDF

17 Pages5025 Words77 Views
   

Added on  2021-06-18

Bring Your Own Device Policy - PDF

   Added on 2021-06-18

ShareRelated Documents
WIRELESS DEPLOYMENT By(Name) (Course)(Professor’s Name)(Institution)(State) (Date)
Bring Your Own Device Policy - PDF_1
Abstract. This into the network security issues affecting the Rare Vintage Auto Parts Ltd which supplies spare parts to the automotive industry. The issues include the focus on the wireless system, links, tills and the deployment of the wireless networks that enabled the communication and data transfer across the different shops within the city. The issues realized and discussed in the report as the following: poor network and data encryption, a wireless network that broadcasts its SSID, the network connection had no firewall nor a virtual private network, no procedures and policies guiding the network and a mixture of network data cards among others. The report addresses the solutions to the strengthen the network security and policies including software and hardware deployment with the Bring Your Own Device policy.
Bring Your Own Device Policy - PDF_2
ContentsAbstract................................................................................................................................................2Introduction.........................................................................................................................................4Methodology........................................................................................................................................4Findings................................................................................................................................................5Deployment of appropriate hardware and software...................................................................13BRING YOUR OWN DEVICE POLICY....................................................................................13Privacy expectation........................................................................................................................13Acceptable use................................................................................................................................13User acknowledgment and agreement.........................................................................................15References..........................................................................................................................................16Bibliography......................................................................................................................................17
Bring Your Own Device Policy - PDF_3
Introduction. This report is addressing the concerns raised by the owner, management and personnel of the Rare Vintage auto spares LTD. These trepidations resulted from a steady drop in the smooth running of the business that included having a very rude IT administrator that used the wireless network to access illicit material, Miller, Voas & Hurlburt (2012). The sacking of the IT administrator has compounded the wireless network issues affecting the company evenafter replacement with a non-expert in the field of network security. The report includes the identified and analysed risks that make the security of the wireless network system very vulnerable to interference and modification. Using the risk assessment matrix, the threats and vulnerabilities of the network set up have been accessed and documented, Thomson (2012). The following are the top ranked security vulnerabilities, a very weak WEP encryption is being used during connection and data transfer, an incorrect antenna type with a high power access point and mixture of network card standards. Methodology. The following methods were used to collect and analyse the data according to Morrow (2012).In-depth Interviews were conducted with more than 30 employees from the different offices of the company questioned to comment on the wireless connection set up, express their objections and failings. Network exploitation testing: the network was tested using the available exploitation tools to determine the ability to withstand and prevent external or internal attacks. Access to secondary sources of data such as the deployment files and documents left behind by the former IT administrator in the data cabinets. Direct and participatory observation in the daily activities and practices of the employees while taking notes on the wireless configuration, hardware, software, security policies and practices and also asking the employees questions relating to the network use.
Bring Your Own Device Policy - PDF_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wireless Security for Rare Vintage Auto Parts Ltd
|19
|5679
|416

Wireless Security: Issues and Solutions for Rare Vintage Auto Parts Ltd
|21
|5735
|409

Implementing a Secure Wireless System in an Enterprise Environment
|30
|5527
|498

Rare vintage Auto Parts Ltd Assignment PDF
|21
|5842
|24

CPIS 606 Internet Security Auditing Report
|5
|900
|16

Wireless Communication Assessment
|11
|2031
|36