logo

Risks and Vulnerabilities of BYOD Policy in Gigantic Corporation

   

Added on  2023-06-04

12 Pages4187 Words235 Views
Subject code, IT risk management, semester number
UNIVERSITY
DATE
{Student Id, student name} 1
Risks and Vulnerabilities of BYOD Policy in Gigantic Corporation_1
Subject code, IT risk management, semester number
Executive Summary
.This is a report highlighting the risks and vulnerabilities that Gigantic
Corporation faces from the use of the BYOD policy. The report analyzes different
vulnerabilities and how they may impact the corporation’s information system if
they occur. Users risk losing all the data on the devices if a breach occurs or even
losing their devices if it leads to it. The management of Gigantic Corporation will
have a better understanding on the threats that lack from implementing a BYOD
policy after going through this report. This should also help them in coming up
with the best alternative to mitigate the threats.
{Student Id, student name} 2
Risks and Vulnerabilities of BYOD Policy in Gigantic Corporation_2
Subject code, IT risk management, semester number
Table of Contents
Executive Summary...................................................................................................1
Introduction...............................................................................................................3
Importance of a BYOD approach to the corporation.............................................3
Vulnerabilities of BYOD to the Corporation.........................................................4
The Corporation Security threats...........................................................................5
BYOD privacy concerns........................................................................................5
Alternatives that Gigantic Corporation can choose from to mitigate BYOD risks6
Conclusion.................................................................................................................7
References...........................................................................................................8
{Student Id, student name} 3
Risks and Vulnerabilities of BYOD Policy in Gigantic Corporation_3
Subject code, IT risk management, semester number
Introduction
Most firms have chosen the trending wireless technologies and cloud computing in
storing their data and transmitting information. This also leads to the organizations
adopting a culture that allows staff members to work from their own devices as it
offers them a chance to maximize on the cloud services and wireless connections.
More people become connected through their devices on a common network.
Personal devices are also increasing as consumers demand for the products keeps
growing. Staff members hence find owning a personal device like a laptop or
smartphone and bringing it to work as normal and necessary. Employees prefer
carrying out all their tasks from their own devices reducing the workload of
transferring files from their devices to the corporation’s machines. This leads to an
increase in the number of personal devices brought in the work premises. Users
also want privacy with what they do with their devices hence require management
to avoid accessing their personal data even under the firm’s network (Jamil &
Zaki, 2011).
Gigantic Corporation is an organization offering Information technology services.
The organization operates on a BYOD approach allowing employees to carry out
their tasks with their own devices. Multiple employees hence carry their devices to
the workplace and add them to the corporation’s network framework anytime they
are working. The use of the personal devices goes beyond work related activities as
employees use their devices to store their own data or communicate with external
people. Personal use of the devices through the corporation’s network system
creates a loophole for data breach. Mitigation measures should be employed by the
management of the firm that will check the vulnerabilities of using personal
devices in the organization. Some measures they could use are installing firewalls
on the network that prohibits users visiting dangerous web links, using
authentication procedures to gain access to company data, regulating the devices
brought in the work premises and training employees on safe ways to manage the
data on their devices
Importance of a BYOD approach to the corporation
BYOD systems comes with its benefits. As the demand by staff members to work
from their devices keeps growing everyday so do the benefits of BYOD systems.
Less complications are experienced by users in terms of understanding operating
systems and applications on the machines as they know their way around their own
devices. Working from a personal device also allows employees to carry out their
duties virtually hence they can work from anywhere. Staff members need not to be
in the premises in order to access the corporation’s resources to do their duties.
Employers and the management also benefit from BYOD systems. Expenditure on
{Student Id, student name} 4
Risks and Vulnerabilities of BYOD Policy in Gigantic Corporation_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security Analysis: Cyber Security
|10
|1925
|30

IT Risk Management: Threats, Vulnerabilities and Prevention Methods
|21
|4785
|434

Risks and Security Challenges of Wireless Communication and Mobile Technology
|7
|1235
|112

(PDF) Risk assessment and risk management
|17
|3212
|114

Internet of Things Security and Privacy
|16
|4358
|255

Cyber Security: Risks and Solutions for South Cross University
|12
|2052
|467