You should download this ebook from google ,go to page 113-115 read Case 1 Manag
ID: 672713 • Letter: Y
Question
You should download this ebook from google ,go to page 113-115 read Case 1 Managing BYOD Security Risks and answer the questions 1 - 8.
Information Technology for Management Advancing Sustainable, Profitable Business Growth.....
9th edition:: Ebook 2013
.page 113 - 115
.Case Study:: Managing BYOD Security Risks
.Discuss ::
1. Explain the pressures driving the BYOD trend.
2. Why had organizations initially rejected the idea?
3. What contributed to BYOD acceptance?
4. Identify and discuss four key challenges of BYOD.
5. How does AT&T Toggle attempt to resolve the challenges you identified in question #4?
6. With just a smartphone, users can conduct nearly all their banking business at any time.
The level of flexibility and convenience opens up new avenues for fraud and cybercrime.
To what extent are users willing to give up convenience for their own security? And for
the security of their companies?
Decide::
7. View the brief video titled “Learn More About AT&T Toggle.” Find the link in the
Chapter 5 Link Library on the book’s web site, or visit wireless.att.com and search for
the title (wireless.att.com/businesscenter/popups/video/learn-more-about-toggle.jsp).
a. How is access to the work container protected? What determines the strength of this
protection?
b. Would you feel confident that your privacy was protected using Toggle?
Debate::
8. How do you achieve the right balance to protect the enterprise’s security and the
employee’s privacy? What is the right balance of security and privacy?
.
.
Ebook download link.: https://www.google.com.au/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&cad=rja&uact=8&ved=0CDEQFjABahUKEwjC9aeg47XIAhXJQI4KHSErCbQ&url=http%3A%2F%2Fwww.karafarini.biz%2Fdl%2Fitm.pdf&usg=AFQjCNEzJKkekWTFkvLwJStpsKI5v1I0qQ&bvm=bv.104819420,d.c2E
..
..
Explanation / Answer
Question 1 Answer
The BYOD Revolution threw that first consideration right out the window. Devices became very user friendly, and it seemed that anyone with even a minor aptitude for tech could configure a laptop, smart phone or tablet to access a network.
The second Consideration, Security, got left by the wayside in the rush
IT Departments everywhere came under pressure to help company employees access the company network by a wide variety of devices, running a number of different operating systems (of varying release levels) with a seemingly infinite set of possible configurations, and still keep the network safe.
On top of that, every user expects support for their devices if they need troubleshooting.
Question 2 Answer
At Foley & Lardner LLP, the 900 or so attorneys there are offered the option of BYOD on a voluntary basis and with a subsidy to keep it "cost-neutral" to whatever corporate-issued device that BYOD is expected to replace, says Rick Varju, director of engineering and operations there. He says this "whole consumerization of IT craze"
"It's about liability," when it comes to corporate data at risk, Pironti says about BYOD. In some places, BYOD should be rejected because it's too big a risk, or it's deemed a violation of the user's privacy. Either way, he warns, don't think a personally-owned BYOD device won't be subject to regulatory-driven audits just like corporate devices.
Question 3 answer
Denial. “Are any employees really going to access our ERP suite on a mobile device? Those tiny screens make it just too much bother.”
Anger. “No, we will not grant you access for your iPad. This is a work environment, you slacker. You’re just going to use it to play Angry Birds anyway, and then click over to the CRM app when your boss walks by.”
Bargaining. “Okay, you can use your iPhone, but not Android. And you have to sign a waiver giving us the right to wipe your phone remotely whenever we want.”
Depression. “What on earth are we going to do about this BYOD problem? How are we going to pay for this? How are we going to manage and secure this? It’s a Sisyphean task. Just shoot me now.”
Acceptance. “This BYOD stuff isn’t really as bad as it seems. There are tons of tools out there for both security and management. You know what, once employees are reliably and securely mobile, remote work becomes more constructive, downtime between meetings can be productive, and, hey, I have this idea for a cool app that would tie our CRM to our social-networking efforts...”
Question 4 Answer
BYOD users are security problems
Even if you haven’t enabled a BYOD policy, employees may already be using personal mobile devices to access, manipulate and share enterprise data through mobile apps. By implementing a BYOD program with the right policies and tools, you are not only securing your data against unauthorized access but also increasing employee productivity by creating new ways of performing tasks. By taking a comprehensive view of enterprise mobile security, organizations can reduce risk and reap the rewards of a more engaged, connected mobile workforce.
Enabling BYOD increases the complexity of IT environments
Businesses already manage complexity by providing corporate-owned smartphones and tablets to employees and allowing them to work from home by connecting through a virtual private network (VPN). The big thing that’s changing with BYOD is allowing personally owned devices secure access to your enterprise network. There are now tools that make it easier to manage this and reduce the risk (see next section). Enabling BYOD could outweigh the cost of managing complex IT environments by providing improved flexibility and enterprise agility.
Mobile security is a primary technology challenge.
It can’t be denied that hackers are finding new ways of attacking mobile devices and corporate networks, but that shouldn’t be a hindrance to adopting BYOD. Consider using a mobile device management (MDM) solutionto manage the fleet of mobile devices that connect to your network. With MDM you gain complete visibility and control over mobile devices; detailed hardware and software inventory, location, network and usage data and can bring mobile computing into compliance with IT security policies. If implementing and supporting MDM is one more thing than your IT team will struggle to manage, consider a managed MDM solution.
BYOD can pose a threat to personal employee data too.
IT managers who allow personal devices into their businesses have expressed concerns about security threats to corporate data due to loss of mobile devices, data integrity compromises and sharing of sensitive confidential information over social media. But some IT managers see a threat to personal data too.
When a device carrying corporate data is lost, stolen or compromised, IT needs to be able to lock it down and even wipe the data. When an employee leaves the company, IT may also need to remove all company information. The perceived risk in these situations is that individuals will sacrifice personal emails, photos and apps to satisfy corporate privacy and security policies. But containerization tools are making it much easier to keep personal and corporate data and apps separate on both BYOD and COPE (corporately owned, personally enabled) devices. You need to respect the privacy of users and secure only the corporate data on personal devices.
Question 5 Answer
describe the nature and basis of the claim or dispute; and set forth the specific relief sought ("Demand"). If AT&T and You do not reach an agreement to resolve the claim within 30 days after the Notice is received, You or AT&T may commence an arbitration proceeding. During the arbitration, the amount of any settlement offer made by AT&T or You shall not be disclosed to the arbitrator until after the arbitrator determines the amount, if any, to which You or AT&T is entitled
Question 7 Answer
In the modern world, information is valuable. People make fortunes selling and buying nothing but information. Business secrets are guarded sometimes better than military ones.
On the other hand, private and business information becomes even more vulnerable. For example, a computer connected to the internet can be attacked by hackers, and, as a result, sensitive files may be stolen. Sometimes they are more important, sometimes less, but in general nobody wants to see personal files appear on the internet.
But hackers and viruses are not the only hazard to your privacy. If you share your computer with other people, your files can be made available to those people relatively easy, even if you use different usernames to login.
Start the program. Create new encrypted container.
Question 8 Answer
Global organizations may find it especially difficult to implement a common, one-size-fits-all BYOD policy business-wide because privacy laws vary from country to country, and state to state in the U.S. Ovum’s report, International Data Privacy Legislation Review: A Guide for BYOD Policies, discussed how data privacy laws differ across seven countries (the U.S., U.K., Germany, China, Australia, France, and Spain), but, two main points are consistent to all:
Organizations must take sufficient measures to ensure that client or patient information, or any other personal data that they process, is secure.
Employees must give consent for their private data to be accessed and processed.
Because there is no one-size-fits-all template for BYOD policies, it’s important to have the capability to treat each user differently. If your organization can customize the means for obtaining consent for different users in different regions, you will know who has accepted which terms. If it is an automated part of the workflow, it also will protect the organization by ensuring there is an audit trail.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.