logo

Information security assignment : BYOD

   

Added on  2021-05-31

11 Pages2834 Words32 Views
Running head: INFORMATION SECURITY
INFORMATION SECURITY
Name of the Student
Name of the University
Author Note:

INFORMATION SECURITY1
Introduction
BYOD stands for bring your own device, which is considered to be an emerging kind of
network administration. Despite of the benefits of BYOD it is more focused to various kinds of
new challenges in terms to security in various enterprise network. In existing kind of solution
like management of mobile device its mainly focus on providing protection and control to data of
device (Rafferty, Iqbal & Hung, 2017). It mainly tends to fall short in providing network-based
protection system. New innovation in this domain in more focused in providing network
administration which mainly comes up with network policies and capabilities over device and
mobile based application. Various kinds of new PBS that is programmable BYOD security is a
new kind of security which mainly has the function of network management and enforcement on
various mobile based application and large number of devices (Wang, Wei & Vangury, 2014).
BYOD is motivated by another kind of technology or concept that is SDN (software defined
networks).
In the coming pages of the report an overview of the involved technology that is BYOD
and its countermeasures has been provided. Various kinds of relevant technologies to BYOD like
PBS (programmable BYOD security) has been discussed in details in the above pages of the
report. Various kinds of challenges and issues and BYOD has been provided in brief in the above
pages of the report. An analysis has been done on the fact that whether this technology has any
kind of gap or not. After that a summary has been provided regarding the future of BYOD
devices and their countermeasures.

INFORMATION SECURITY2
Discussion
Overview of technology
BYOD is considered to be new kind of technology which has come into action in last few
years. Various enterprise round the globe are encountering limitation for the traditional
infrastructure, growing cost of overhead and along with a slow process of adaptation of new
kinds of technology. BYOD generally enables various kinds of enterprise to implement their own
devices in the given workplace (Rafferty, Iqbal & Hung, 2017). Bring your own device can be
defined as the shift in cost overhead of ownership of device from any kind of corporation.
BYOD has some kind of crux which is considered to be close and convolution of interplay in
relation of network security. Mis- management can be easily defined by the users which open
workplace to provide an array of unwanted and malicious applications. In the present situation
there are new kinds of challenges which can be easily used by various BYOD enabled or based
devices which are running on them. Overcoming to and fro work is well known kind of work
which is totally based on safe haven of the organization. Generally, this type of device requires
extra security even outside various threats(Wang, Wei & Vangury, 2014). It is important for
various kinds of security network to need more kind of security and capabilities based on
management for managing the device. Without the help of proper kinds of tools, the benefits
which is provided by BYOD is mainly overshadowed by various kinds of holes which are
created in management of security of enterprise.
Relevant technologies and its application
Google has come with a system known as wide management system known as android
device management (ADA) which was previously known as Android 2.2. The system is more
focused to management related features through the help of API. It is much more focused to

INFORMATION SECURITY3
provide large number of security related awareness about application of device. Various kinds of
techniques like secure kind of strong password enforcement of policy and wiping of remote
devices which are provided by ADA (Rafferty, Iqbal & Hung, 2017). At present the complex
nature of deployment generally needs more kinds of features and reconfiguration which is
mainly used for securing of developing network. Solutions like mobile device management tends
to provide complexity in managing of capabilities. Support of OS level encryption tend to
provide corporate and personal kind of data for implementation of BYOD (Siboni et al, 2016).
The solution merely focuses on the various kinds of device and application of data which can
easily control and provide protection. They generally do not have sufficient kind of network
features like fine- grained network security features and access control. It is considered to have
problem for managing comprehensive for managing any kind of scenario. One of the practice
which can be applied to present security policy is making use of new kind of BYOD device is
making use of extra kind of network-based controls (Putri, & Hovav, 2014). A proper kind of
management of in today’s mobile based BYOD devices is nothing but management of dynamic
kind of network-based devices. Various kinds of devices tend to move for change in run-time at
time of operation. PBS or programmable BYOD security is considered to be new kind of security
solution which is considered to be fine grained. Programmable network security which is
implemented to BYOD device of enterprise networks. The ultimate solution can be achieved by
the help of software defined networks, that ultimately provides a new based architecture for
providing visibility of network side, program and along with control (Bello, Murray &
Armarego, 2017). Various kinds of existing SDN techniques are also required for making
changes in the network infrastructure like switches and routers. PBS is mainly applied to concept

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Policies of Mobile Devices - Huawei
|4
|434
|23

Challenges for BYOD in IT Network
|6
|934
|283

Computer Security: Importance of VMware Virtual Machine for Testing and Security Evaluation
|16
|4328
|167

Project Background 2 1.1. Network Management and Security Name of the University Author's note 1.0. Project Background 2 1.1. Project Description 2 1.2. Project Goal 3 2.1. Strategic Alignment of Proj
|14
|3452
|119

Network Management and Security PDF
|14
|3727
|51

Mobile Application Security: Malware Threats and Defenses
|7
|6648
|56