BYOD: Risks, Mitigation, and Implementation for Computer Security

Verified

Added on  2022/08/26

|7
|381
|17
Report
AI Summary
This report examines the implications of Bring Your Own Device (BYOD) policies within a company. The author, acting as a Chief Information Security Officer, addresses the lack of formal BYOD policies and the associated risks. The report outlines the potential dangers, including data leakage, lost devices, hacking, and malware vulnerabilities. It then presents mitigation strategies such as auditing the IT environment, setting security baselines, implementing acceptable use policies, educating users, and investing in mobile device management. The report also includes a marketing slide to promote the benefits of BYOD, emphasizing increased employee productivity and convenience. The report concludes with a list of relevant academic references supporting the discussed concepts and recommendations.
Document Page
COMPUTER AND NETWORK
SECURITY
NAME OF STUDENT:
NAME OF UNIVERSITY:
AUTHOR NOTE:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
AGENDA
The presentation discusses about the policy of
Bring your own Device. The scenario is that as a
chief information security officer it is noticed that
there is a large number of personal mobile devices
that are used by the company on the wifi network of
the company. When it is asked about the policy, it is
seen that there are no such policies in the company.
The presentation discusses about the Bring Your
Own Device. The presentation focuses on the risks
of BYOD and the mitigations of risk of BYOD and a
marketing slide that can be used in order to be
circulated in the office.
Document Page
BRING YOUR OWN DEVICE(BYOD)
Using personal devices in the office or work
area
Connecting to the wifi of office with personal
devices
It can upgrade the productivity and morale of
employee
Document Page
RISK OF BYOD
The risk of bring your own devices include the
following:
Data leakage
Lost devices
Hacking
Vulnerability to malware
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
MITIGATION OF RISKS
Audit of IT environment
Evaluation of specific devices
Set baseline security
Deploy acceptable use of policies and
procedures
Educate the users
Investment in management of mobile devices
Document Page
MARKETING SLIDEBYOD is important for
any organization and it
will help the employees
to increase the
productivity and
convenience.
Increase the happiness
among the employees
Boost the productivity
of the employees.
Document Page
BIBLIOGRAPHY
Dawson, P., 2016. Five ways to hack and cheat with bring‐
your‐own‐device electronic examinations. British Journal
of Educational Technology, 47(4), pp.592-600.
Lee Jr, J., Warkentin, M., Crossler, R.E. and Otondo, R.F.,
2017. Implications of monitoring mechanisms on bring
your own device adoption. Journal of Computer
Information Systems, 57(4), pp.309-318.
Steelman, Z.R., Lacity, M. and Sabherwal, R., 2016.
Charting Your Organization's Bring-Your-Own-Device
Voyage. MIS Quarterly Executive, 15(2).
Dhingra, M., 2016. Legal issues in secure implementation
of bring your own device (BYOD). Procedia Computer
Science, 78, pp.179-184.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]