Security Consultation Tasks 2022

   

Added on  2022-10-11

8 Pages1840 Words8 Views
Running head: SECURITY CONSULTATION
SECURITY CONSULTATION
Name of the Student:
Name of the University:
Author note:
Security  Consultation  Tasks   2022_1
SECURITY CONSULTATION
1
Task 1:
Technological evolution in the industry has introduced an element in the business. This
element is known as the information system and it is responsible for organisation and collection
of data. The main components of the information system are Computer hardware, Computer
software, Telecommunication, Warehouses and databases and lastly the human resources and
procedures. Hardware and software are the basic requirements, whereas the telecommunications
are required for the establishment of the connection in the organisation. The next component of
the information system is the databases and the warehouses (Peltier, 2016). The databases stores all
the relevant information regarding the system, software, resources and requirements of the
organisation whereas the data is analysed with the help of the data warehouses. All the important
information are pooled together with the help of data warehousing. Lastly and most importantly,
human resources and the procedures are the component who run the entire system of information
with the help of certain procedure.
BYOD stands for Bring Your Own Devices. Now a days to increase the profit of the
organisation with the increment of the mobile devices in the system has increased. The
organisational employees are often asked to use their personal devices in order to work
efficiently (Bratthall Tideman, and Lindström, 2018). But there are certain risk that has to be
considered while using BYOD in an organisation. The risks are given below:
Data leakage: The risk of data leakage looms at large due to the usage of the
personalized device. The employees may use their personal mail access or the
device may get stolen releasing the data to the world (Lin and Lin, 2017). At times
the personal devices may have malwares where the integrity of the data may be
compromised.
Security  Consultation  Tasks   2022_2
SECURITY CONSULTATION
2
Management deficit: once the person owning the device is out of the
organisational premises then the control of the company over that employee is
lost.
Device infection: Often applications are downloaded and installed without
reading to the terms and conditions of the app. These applications are capable of
scanning the device without the knowledge of the user. Hence the privacy of the
business data is at stake due to the infected device (Ratchford, 2018).
Poor policies: The organisations interest in the BYOD is keen but the policies are
often weak and leads to major issues in the information system. HIPAA and PCI
DSS policies must be complied with the BYOD services else they should not be
implemented at all (Savchenko, 2015).
Mixing up the personal and professional information: the mobile devices used in
the organisation are often used for the personal purposes of the user. Especially
the smart phones and tablets. The business information and the personal data
mixes up and the chances of data misplacements are high in such cases. Moreover
the personal devices are often used by more than one entity, in that case, the
security and confidentiality of the data is at risk (Teixeira, Sou, Sandberg and Johansson,
2015).
Mitigation of the risk:
The risk arising can however be mitigated or at least prevent with implementation
of the certain measures.
To prevent the data leakage in the system, mobile device management is the best
policy. In case of the device misplacement, remote wipe out of the data must be
Security  Consultation  Tasks   2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Consultation Report and Guideline
|13
|2447
|371

Cybersecurity: BYOD Risk Assessment, Certificate-based Authentication, Anti-phishing Guideline
|10
|2414
|209

Key Elements of Good Information Security System
|3
|362
|20

Risk of using BYOD in ABC Company
|5
|948
|84

Risk Assessment: BYOD Policy
|14
|4528
|331

Hardware Architecture in System Engineering
|5
|592
|20