Computer Science Homework Help

ITEC 610 Bring Your Own Device Policies Discussion

 

Hi please respond to Peer discussions:

Peer 1

Implementing a BYOD policy in my organization would be extremely difficult due to numerous security concerns, as we handle personally identifiable information and have access to government resources. Unsuspecting and untrustworthy employees are one security concern. They pose the risk of memory leakage to an infected device, which could be used to log keystrokes, or an employee with nefarious motives. Tight security controls, encryption, and logging would be one way to mitigate this.   Rooted or jailbroken devices also pose a significant security risk because they can disable security features built into the device by the manufacturer. To address this issue, implement a device enrollment process that includes a check to see if the device is jailbroken and a follow-up check after enrollment. Malicious applications that have been installed on devices are another source of concern. This issue could be alleviated by using anti-virus software.

References:

Kingsley-Hughes, A. (2013, February 14). 6 threats facing BYOD. Retrieved July 13, 2016, from http://www.zdnet.com/article/6-threats-facing-byod/

Phifer, L. (n.d.). Jailbroken device risks: What IT can (and can’t) lock down. Retrieved July 13, 2016, from https://searchmobilecomputing.techtarget.com/tip/Jailbroken-device-risks-What-IT-can-and-cant-lock-down?_gl=1*25wvz*_ga*MTE3MjY1NTk1My4xNjI2NDkyMzkx*_ga_TQKE4GS5P9*MTYyNjQ5MjM4OS4xLjEuMTYyNjQ5MjQ4NC4w&_ga=2.33679397.506102087.1626492391-1172655953.1626492391 

(100 words minimum and reference in APA style).

Peer 2

The notion of Bring Your Own Device, or BYOD has already been used in many companies to increase speed, efficiency, and decrease costs, but on top of that security needs to be top of the list.

Information Technology in the sense of Information Loss, then yes we can fall in a deep pit and our very important data might be lost as there is a high possibility that someone can access the sensitive information of an organization. What is the most likely way for the data to be leaked? In an organization, all employees are allowed to use their own phones, which might lead to the leakage of company information. It is difficult to secure corporate data, when employee-owned gadgets are used by workers.

Additionally, since the devices are owned by the employees, they can install any app or software they wish, including malware, and the company cannot be held accountable.

Now the concern is how to mitigate these security loopholes?

  • One solution is to install a few anti-virus programs and a firewall to prevent malware from entering your system.
  • For this purpose, the organization needs to use mobile devices like iPhones and Windows, so that it can create security maps for them.
  • An organization needs to adopt some security policies, and all of its employees should be trained in those policies.
  • A letter of agreement explaining the carriers’ responsibilities in the event of a data leak must be signed by employees.

https://digitalguardian.com/blog/byod-security-expert-tips-policy-mitigating-risks-preventing-breach