University Name - Information Security - BYOD Case Study Analysis

Verified

Added on  2022/08/25

|5
|620
|20
Case Study
AI Summary
This case study analyzes the Bring Your Own Device (BYOD) trend in the workplace, exploring its impact on information security and business operations. The assignment addresses the advantages of BYOD, such as increased employee satisfaction and productivity, while also highlighting the significant security risks associated with it, including potential data breaches and lack of IT control over personal devices. The solution provides answers to specific questions, discussing strategies for organizations to manage BYOD, such as device tracking, implementing Enterprise Mobility Management (EMM) systems, and adopting clear guidelines. The case study further examines how companies like Intel, SAP, Swiss Re, Blackstone, and Venafi have addressed BYOD challenges through various security measures and policies. Finally, the assignment evaluates the cost implications of BYOD, concluding that while it may boost productivity, the need for software installations to mitigate security risks can increase overall costs.
Document Page
Running head: INFORMATION SECURITY
INFORMATION SECURITY
Name of the student
Name of the university
Author note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1INFORMATION SECURITY
Answer to question 5-14
BYOD (Bring Your Own Device) or allowing the employees to bring their own mobile
devices to the workplace would support in empowering the rate of job satisfaction and
productivity. It has been observed from a survey that the BYOD activity enables an organization
in increasing the employee motivation and satisfaction towards the different activities, as they
feel accustomed to their devices along with the devices being a source of their recreation in
between their shifts. However, the most cited disadvantage of the BYOD is that the IT
department has less control over the individual devices, which might result to compromised
security of the confidential files. The lack of efficient control activities from the side of the IT
department of an organization on the devices might result to data thefts, affecting the brand
image or the interests of the business.
Answer to question 5-15
The organizations might take the initiative of tracking the devices that are being brought
y the employees to their respective work stations. The business must develop a system through
which they might track and monitor the devices that the employees are using, the location of the
devices, the software in the devices and the data that is being transferred through the devices.
However, the organizations might face significant concerns in developing a system for multiple
operating systems due to the variety of the devices that are brought down by the employees. In
this connection, the organizations might consider implementing an Enterprise Mobility
Management (EMM) system in the organizational setting as it would support the same in
tracking and monitoring a huge number of operating systems in one go.
Document Page
2INFORMATION SECURITY
Answer to question 5-16
Intel took the initiative of detailing a clear guideline for the exact information that might
be seen when the administrators manage personal devices. The guideline helped the organization
in monitoring and controlling the activities of the employees even in the context of BYOD.
Moreover, SAP took the initiative of developing a specialized platform for different work related
applications. It enabled the organization in restricting the source activity of the information that
might lead to data theft. The organization also devised a software for decommissioning a device
if it is stolen or lost. Swiss Re developed an EMM system with the purpose of supporting
multiple OS for controlling and monitoring over the information that is viewed by the
employees. Blackstone limited the type of devices that might be brought in by the employees in
their offices, which helped the same in monitoring over the limited number of assorted devices
more easily. Lastly, Venafi took the initiative of providing the employees with their own
smartphones while limiting their access to case sensitive information. The different activities that
were undertaken by the organizations supported in improving their likelihood of saving on
information while adhering to BYOD.
Answer to question 5-17
Allowing the employees to BYOD would not minimize the costs of the organizations as
the monitoring and controlling activities of the organizations through software installations
would account for most of the charges in accordance with the needs of the venture. The BYOD
decisions are taken by the organizations with the objective of boosting the productivity of the
businesses through increased employee job satisfaction. However, the higher risk of information
Document Page
3INFORMATION SECURITY
being compromised might mandate software installations for the organizations, which would
significantly increase the costs.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4INFORMATION SECURITY
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]