This report discusses the risks of using BYOD policy in ABC Company, including the loss of devices, malicious actions, and increased phishing attacks. It also provides recommendations for control measures to mitigate these risks. Find expert study material and solved assignments on Desklib.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
SCIENCE AND ENGINEERING FACULTY IFN511 Security Management - Semester 1 2019 Assessment Item 1: Group Report Student Names:Please fillPlease fill Student Numbers:Please fillPlease fill Report Topic:Risk of using BYOD in the organisation of ABC Company. ItemDetailsMain points and commentsSupportingContributed by (include the main concepts - in point form - youevidence(write the name of the intend to use in your report)(record referencegroup member here, as details for articles)appropriate) IndustryIT service industry About yourSize/Structure The ABC company is one of the well-known IT service industry with about 500 skilled technology consultants. It has it headquarter in Dayton, Ohio. The company of ABC offers its services to about 30,000 customers. The company owns about 4000 corporate devices which are used as a part of the BYOD policy of the company. As the organisation is hypothetical no references can be providedPlease fill selected organisation InformationThe major information assets of the organisation of ABC consists of information related to sales, operational data, financial information and many more. All the information assets of the company of ABC are located within the database of the organisation The dataset of the organisation consists of both physical and logical data sets. The physical data sets consist of details related to the employeeswho are logging in into the devices, details of the files that are modified including the dates and file size. The logical model for As the organisation is hypothetical no references can be provided Please fill
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
creating this data sets does not require any metadata columns and does not need to specify such details in the table. Infrastructure Please fill How does The organisation of ABC uses the BYOD policy within their enterprise in order to transfer necessary information via the systems. The company implemented this so as to lower down the cost of the hardware and software that are used within the organisation. your report topic relate to As recently, the organisation of ABC is facing problems related to phishing where the employees are receiving spam emails in an increased rate, besides the devices are automatically installed with malicious software and use of untrusted mobile operating system, the threat related to BYOD policy is addressed in this report. As the organisation is hypothetical no references can be providedPlease fill this organisation?Threats related to BYOD policy is common in various organisations as for example the threat related to BYOD policy is notable in the organisation of Australian Mobile Telecommunication Association.
For example: The main security issue that is faced within the organisation of ABC, is loss of devices, malicious actions within the organisation, and increased rate of phishing attack. As the organisation is hypothetical no references can be providedPlease fill Main aspects ofSecurity Issue Vulnerabilities The vulnerabilities that are identified within the organisation includes use of malicious operating systems, accessing data of others without any authentication, use of untrusted mobile operating system and most importantly, the company of ABC uses the password- based authentication method in order to verify the access of the users. The identified vulnerabilities can be exploited by various means like well-known phishing attack. The company faced loss of huge amount of devices that are used while transferring data, automatic installation of malicious operating systems within the systems as a result of which the information assets of the organisation are at the verge of risk where it is reported that some information related to finance and also the patents of the organisation were stolen using malware links.your chosen topic As the organisation is hypothetical no references can be providedPlease fill Possible controlAs a means to control the risks of the BYOD policy, the employees need to be trained about the latest security vulnerabilities, and should be trained to handle those risks by following some simple measures. The basic As the organisation is hypothetical no references can be provided
steps towardspreventing the risks of using BYOD includes, use of verified and authenticated software and operating systems, use of certified based authentication system in place of password-based authentication system. measures Similar real life cases The real-life example of the consequences of the threat of using BYOD is reported in case of United Kingdom, where they faced a major theft by losing about 2 million of mobile devices in the year 2005. Besides the real-life case study of the vulnerabilities of using the BYOD policy is seen in the Australian Mobile Telecommunication Association where it was reported that the organisation a major loss of about 100000 mobile devices by which important information were transferred. As the organisation is hypothetical no references can be providedPlease fill Recommendations For the organisation of ABC company, it is recommended that they use the certificate-based authentication system in order to authenticate its users instead of using the low security level password-based authentication system.Please fill relevant to As the organisation is hypothetical no references can be provided information security goals of
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
organisation Reference Details: Keep track of your source materials – you will need to include citations in the text and the reference details in the References section of your report (Penalties apply if this is not adequately addressed). A useful guide to referencing, citation and report writing is:http://www.citewrite.qut.edu.au/.