logo

Implementation of BYOD

   

Added on  2023-06-09

6 Pages1168 Words252 Views
Running Head: IMPLEMENTATION OF BYOD
Implementation of BYOD
Name of the Student
Name of the University
Author Note

1IMPLEMENTATION OF BYOD
Table of Contents
Introduction......................................................................................................................................2
BYOD Security policy.....................................................................................................................2
Conclusion.......................................................................................................................................4
Reference.........................................................................................................................................5

2IMPLEMENTATION OF BYOD
Introduction
BYOD is a practice performed by higher authorities of an organization to allow
employees of their organization to bring their own device to office premises and work on their
own computing device. This ensures the fact that total cost incurred in setting up of the office
decreases. This report will include security policies that an organization must maintain in order
to keep their servings secured and privacy of their clients is maintained.
BYOD Security policy
Security policies that must be implemented in order maintain a proper BYOD security policy
are as follows: -
1. Multilayered password system: Setting password is one of the most common techniques
that is used in maintaining security. Setting a onetime password might not be efficient
enough to procure security to data that are stored in the computing device. Hence setting
up of distinct passwords for individual application is one technologies that must be
implemented in order to stay protected from unauthenticated access to the data.
Encryption of password also helps in keeping the password secured (Morrow, 2012).
2. Biannual re authentication: Bi annual authentication ensures the fact that employee who
is using the computing device is genuine in nature. Re authentication is considered as one
of the most important features that is incurred in the process that ensures accessing of
data by unauthenticated person is stopped when genuine employee is not present (Hovav
& Putri, 2016). To prevent this issue of accessing some ones portal during their
absenteeism can be decreased only with the help of Biannual re authentication

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Business Charter Analysis
|5
|749
|369

Cyber Security Vulnerabilities and Recommendations for ABC Technology
|10
|3323
|1

Cyber Security - Assignment
|14
|3398
|36

Cyber Security: Report on BYOD System and Authentication Methods
|11
|1923
|183

Cybersecurity: BYOD Risk Assessment, Certificate-based Authentication, Anti-phishing Guideline
|10
|2414
|209

Cybersecurity Threats and Anti-Spam 3 CONCLUSIONS 4 INTRODUCTION Cybersecurity Threats and Anti-Spam 3 CONCLUSION 3 REFERENCES 4 INTRODUCTION Cybersecurity Threats and Anti-Spam 3 CONCLUSION 3 REFEREN
|7
|1670
|122