Computer and Network Security:1175719

Agenda

The presentation discusses about the policy of Bring your own Device. The scenario is that as a chief information security officer it is noticed that there is a large number of personal mobile devices that are used by the company on the wifi network of the company. When it is asked about the policy, it is seen that there are no such policies in the company. The presentation discusses about the Bring Your Own Device. The presentation focuses on the risks of BYOD and the mitigations of risk of BYOD and a marketing slide that can be used in order to be circulated in the office.

Bring your own device (BYOD)

Using personal devices in the office or work area
Connecting to the wifi of office with personal devices
It can upgrade the productivity and morale of employee

Risk of BYOD

The risk of bring your own devices include the following:
Data leakage
Lost devices
Hacking
Vulnerability to malware

Mitigations of Risks

Audit of IT environment
Evaluation of specific devices
Set baseline security
Deploy acceptable use of policies and procedures
Educate the users
Investment in management of mobile devices

Marketing SLID

BYOD is important for any organization and it will help the employees to increase the productivity and convenience.
Increase the happiness among the employees
Boost the productivity of the employees.

Bibliography

Dawson, P., 2016. Five ways to hack and cheat with bring‐your‐own‐device electronic examinations. British Journal of Educational Technology, 47(4), pp.592-600.
Lee Jr, J., Warkentin, M., Crossler, R.E. and Otondo, R.F., 2017. Implications of monitoring mechanisms on bring your own device adoption. Journal of Computer Information Systems, 57(4), pp.309-318.
Steelman, Z.R., Lacity, M. and Sabherwal, R., 2016. Charting Your Organization’s Bring-Your-Own-Device Voyage. MIS Quarterly Executive, 15(2).
Dhingra, M., 2016. Legal issues in secure implementation of bring your own device (BYOD). Procedia Computer Science, 78, pp.179-184.