logo

Bring your Own Device | Project

   

Added on  2020-04-01

17 Pages5265 Words85 Views
Running Head: “BRING YOUR OWN DEVICE” PROJECT1Title: “Bring your Own Device” ProjectName: Institution:

“BRING YOUR OWN DEVICE” PROJECT2ContentsExecutive summary....................................................................................................................3Review of project.......................................................................................................................5Project impact on Aztec security posture...................................................................................6Risk assessment – threats, vulnerabilities and consequences....................................................9Threats....................................................................................................................................9Vulnerabilities......................................................................................................................10Consequences.......................................................................................................................12Existing recommendations...................................................................................................12Risks for Data security.............................................................................................................12References................................................................................................................................14

“BRING YOUR OWN DEVICE” PROJECT3Executive summaryProfessionally run organizations consistently carry out risk assessments on their business operations so that they can identify and deal with threats to their business. Beyond undertaking risk assessment and management as a mere good corporate governance measure, there is the more important need to identify the potential risks that a business faces, and its capacity to respond to them in case they do occur. Businesses also need to properly map out the risk areas in their businesses, so that they can adopt appropriate strategies to deal with these risks while dedicating the required resources for this task.Risk emanates from the unauthorized access or utilisation of information which is transacted or stored using technological tools such as phones and computers. Organizations constantly worry about being victims of hacking schemes perpetrated by cyber criminals. For this, they come up with complex security systems that try their best to keep up with developments in cybercrime. The risk does not always emanate from the outside, however. Internally, employees may be guilty of acts of omission or commission which expose their organizations to risk. This may include negligently or maliciously disclosing confidential information, or failing to secure the information in their care appropriately, causing it to fall into the wrong hands.Risk assessments encompass several factors involved in the IT framework. The factors include the people who use the system, including the users, administrators and managers, as well as the hardware used. Networks used to pass information, and software which runs the hardware is also important factors, as is the overall system governance that thecompany has adopted. A vast majority of Australians have cell phones, which they carry to work. A significant number of these phones are Smartphones, which are able to perform several roles akin to those of a computer. At the same time, a big number of Australians own laptops, tablets and other gadgets which can be used for communication, in addition to performing

“BRING YOUR OWN DEVICE” PROJECT4many tasks at the workplace. A company may be tempted to allow employees to bring in their devices and use them to work, for several reasons. First, this saves the company cost. Instead of having to acquire the said gadgets, the company can easily utilize what the employees already have, and only engage in routine maintenance and monitoring. A second reason for allowing this is to enable connectivity between employees if it is an important part of the work that they do, and where the same connectivity cannot easily be provided by the company’s assets. The employees may in such circumstances be more productive using their own devices, as opposed to having company – provided infrastructure. This decision may, however, be laden with several risks, that at times force companiesjust to opt to equip their employees with company assets, which can easily be maintained andmonitored, in addition to providing for uniformity. Review of projectThe project to allow employees use their devices to work has several merits and challenges, as described before. The benefits mainly refer to the increased connectivity and ease of work, which may improve morale and productivity in some instances. On the other hand, unwanted access to information, irregular use of company resources and difficulty in monitoring activity are some of the challenges. According to Derks and Bakker (2010), the organization must be in well understanding of its priorities. Only then will it be able to make the right decision about allowing the use. Technology has dramatically changed the way businesses conduct their affairs, mostlymaking communication faster and easier. It has also provided companies with powerful tools to communicate with their customer's conduct market research and facilitate intra-organizational transactions. The development of information technology has not been withoutits own risks and challenges. For instance, the field is constantly changing, sometimes dramatically. Organisations have to constantly check their assets to ensure they are up to the task and change what is no longer well equipped for current and future business needs.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Allowing Employees to Bring Your Own Devices at Work (BYOD Project) at Aztek
|13
|5803
|303

Risk Assessment: BYOD Policy
|14
|4528
|331

Bring Your Own Device (BYOD) Project Description: Aztek Corporation
|20
|5312
|490

Bring your own Devices Information Security
|23
|5439
|40

IT Risk Assessment Report for Aztek's Technology Decision
|2
|990
|458

Case Study on IT Risk Assessment
|15
|6227
|173