Name ID Please Type Complete Answer Given the growth in people, devices, and dat
ID: 3749122 • Letter: N
Question
Name ID Please Type Complete Answer Given the growth in people, devices, and data connected to the Internet, how should security policy developers adapt to the new environment? Are there new security policy considerations that are needed, or existing security policy statements that should be changed or even eliminated? For example, many security policies were created when most Internet users were based in North America and Europe. Does the rise in Internet users in Asia, Africa, and Latin America require changes to security policies? For example, security policies have been optimized for a desktop-centric world, where the computing machines, their operating systems, and oftern their users were fixed to a geographic location. What changes are necessary to accommodate a more mobile-based world such as Bring Your Own Device (BYOD)? It is expected that you will have to do some research on the net to answer this question. Remember to correctly cite the work or words of others and include a reference list at the end of your answer for each source cited.Explanation / Answer
Please Note: I cannot post any references or links as we are prohibited from doing so.
Answer)
As the Internet is expanding, so are the computers and other devices are growing and thus he data related to all these in the networks are increasing day by day. Various new environment is being setup to accommodate the new users and new devices based on many devices and platforms. Thus, security of the network and the intranet and the internet is a big issue nowadays. Thus, with the increase and expansion of everything, security policy should change also to adapt to the current and future requirements.
Thus, security policy developers should service the security policy to adapt to the new environment. As the new environment poses newer and more critical and also unknown security risks and issues related to the network also threats and attacks related to the Internet. Thus, new security policy consideration re needed. Existing security policies should be changed, modernized or phased out in a timely and futuristic manner incorporating stricter rules and policies. Security policies we created for most users in North America and Europe. Yes, the rise in the number of users in Asia, Africa, etc. also require the changes to the security policy for the above mentioned reasons only. Thus, it is very important.
Security policies have been optimized for desktop systems and other machines, OSs and the users of a geographic region. This is because there are many desktops, devices, OSs across the geography and thus many different users. The changes necessary to accommodate BYOD has to be the change in the policies. BYOD is bring your own device where people use their personal devices for official purposes in work environments. The policy change to do thus would be to :
Know about the Business and Regulatory Processes that exists altogether
A safe Protocol Foundation for safe exchanging of messages
Legal Liabilities protection
Security and Technical Issues handling and resolution
Effective Installation procedure assist
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.