Security Programs: Elements, BYOD Impact, and Risk Assessment

Verified

Added on  2022/09/05

|3
|362
|20
Report
AI Summary
This report examines the key elements of security programs, focusing on confidentiality, availability, integrity, non-repudiation, and authenticity. It then analyzes the impact of Bring Your Own Device (BYOD) policies on organizational mobile security plans. The report highlights potential risks associated with BYOD, such as data leakage, device and network impact, malicious applications, and difficulties in device management. It suggests that BYOD policies primarily facilitate document and email delivery, and can be risky for organizations. The report references several sources, including Exabeam, The Balance Careers, CIMCOR, and Privacy Rights, to support its findings and provide a comprehensive overview of the topic.
Document Page
Running Head: SECURITY PROGRAMS 0
Good Security Programs
Student Details:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
SECURITY PROGRAMS 1
Key elements of good information security system
Based on the good information security system, the key elements considered are
confidentiality, availability, integrity, non-repudiation, and authenticity. These elements
define maintaining honesty, keeping the information confidential, and making easy use
(Cassetto, 2019).
Effect on organisation’s mobile security plan
In organisations, implementing BYOD (Bring Your Own Device) policy has nothing
to do with security (Lucas, 2019). But, it effect the mobile security plan with the possibility
of data leakage, impact on device’s network, availability of malicious and fake applications
controlling the devices even within the presence of BYOD policy, the inability of controlling
devices, lack of management due to company’s wrong building and device infection because
of plans carrying any malware within the device (Privacy, 2014). Also, its presence mixes the
business and personal use certainly, and lastly, poor policies where BYOD can be effective in
terms of security at some places but is risky enough for organisation’s mobile security plan.
Thus, BYOD policy can only help organisations in delivering documents and e-mails through
work systems (Ogden, 2017).
Document Page
SECURITY PROGRAMS 2
References
Cassetto, O. (2019, May 30). The 8 Elements of an Information Security Policy. Retrieved
from Exabeam: https://www.exabeam.com/information-security/information-security-
policy/
Lucas, S. (2019, May 7). The Pros and Cons of a Bring Your Own Device (BYOD) Policy.
Retrieved from The Balance Careers: https://www.thebalancecareers.com/bring-your-
own-device-byod-job-policy-4139870
Ogden, J. (2017, February 16). The 7 Scariest BYOD Security Risks (and How to Mitigate
Them!). Retrieved from CIMCOR: https://www.cimcor.com/blog/7-scariest-byod-
security-risks-how-to-mitigate
Privacy. (2014, October 1). Bring Your Own Device (BYOD) . . . at Your Own Risk. Retrieved
from Privacy Rights: https://privacyrights.org/consumer-guides/bring-your-own-
device-byod-your-own-risk
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]