Need help with your Discussion

Get a timely done, PLAGIARISM-FREE paper
from our highly-qualified writers!

glass
pen
clip
papers
heaphones

suma and Kar-Discussion replies

suma and Kar-Discussion replies

suma and Kar-Discussion replies

Question Description

Read below student posts reply each in 150 words.There are 4 student posts ,please check the names

shalini – The main thought is the security of the organizations network. Another thought is loss of organizational data by a gadget being taken. Extra thought is for the advancement of security policies for BYOD is the threat of malware. Additionally, the possibility to have unapproved access into various regions of an organizations network. Notwithstanding the choice made by the relationship on technique structure, all around, existing methodologies ought to be changed in accordance with ensure that proper refinements are drawn among individual and organization had devices and that present plans are not finished or under extensive concerning tending to BYOD issues (Eslahi et al, 2014).

  • BYOD and the Personal Device Use Policy Implementation Process
  • Personal Device Use Policy Provisions
  • Key Definitions
  • Personal Device System Requirements, Configuration and Limitations
  • Personal Device Security Requirements
  • Investigations and Incident Response
  • Liability and Damages (Eslahi et al, 2014).

The risks related to BYOD must be tended to by an organization before actualizing it. One risk related with BYOD is if the personal devices are lost or taken the organization will most likely be unable to stop any information in the devices from being undermined. An organization not having a BOYD strategy is a significant risk. Practically 60% have no personal gadget approach set up, and, among those with policies, 24% make special cases for officials, who may handle considerably progressively delicate data; accordingly, these organizations are increasingly vulnerable to data loss and genuine consistency issues. Another risk is when representatives access the network that has been prohibited by their organization. “Organizations that confine certain devices from network access may discover representatives utilizing a workaround to integrate with corporate assets; certain mobile applications can empower workers to deceive network access control checks.” Failure to update security software by BYOD users is a risk and organizations need to have policies set up to guarantee the BYOD users are made mindful of the requirements for their allowed use of their devices (Disterer & Kleiner, 2014).

The significant challenges of enforcing policies concerning BYOD, portable and mobile devices.

  • Long-period vendor plans
  • Lost devices
  • Data possession
  • Corporate end-user device policy
  • Application deployment into severs
  • Patches and updates (Disterer & Kleiner, 2014).

Preetham – BYOD Security Policies

BYOD involves the practice of allowing employees to bring along their devices to work for use with the organization systems, software, network or information. In the recent world, BYOD has risen as a trend in most organizations with an increased number of employees using their own devices in the workplace. BYOD has proved beneficial to organizations in that it has led to improved productivity, minimized IT and operational costs, and provided the flexibility of the employees and a higher appeal in terms of hiring and retaining of staff in an organization (Downer, & Bhattacharya, 2015). There is, therefore, a need for BYOD policy creation in the establishment of BYOD security policies. The BYOD policy should, therefore, ensure that it addresses the basic considerations which include the goals of the program, specific employees that can bring their own devices, which devices are allowed for use in the organization and the access levels that the employees are granted to access when in possession of the personal devices.

It is also important to dictate who is responsible for paying for the devices and the data coverage that is needed. It is also crucial to take into consideration the regulations that must be adhered to when using employee devices in the organization. It is also important to outline the effects of violations of the BYOD policy by the employees. An organization also needs to take into account the support that it will offer to the BYOD users which may include troubleshooting, software updates, and maintenance of the BYOD devices (Vignesh, & Asha, 2015). There is also a need that the organization seeks to provide the methods that are going to be used in securing the BYOD devices before they are sold or disposed of to third parties in an effort to ensure that the organization’s information remains secure and is not exposed to interference.

Most organizations however are still finding it difficult in allowing their employees to use their own mobile devices to access the organization IT systems following the security challenges that are presented by BYOD. They include physical theft of the devices, hacking issues, fired employees, lost or stolen devices, malware protection, policy enforcement, and IT support and employee education.

Mukesh – Access controls and data protection

Being a known and well-established company, Sony is vulnerable and a good hit for hackers today. Access controls and data protection helps in regulating the computing environment used by the firm. There are various types of data control and stability that the Sony company is recommended to use to ensure the computing environment is safe and secure.

The establishment of identification and authentication is an important step that should be established in the organization to secure the computing systems. The use of passwords and security tokens are examp0le of how this step should be found in the organization. Management of the security procedure set through identification and authentication can be managed in the company making it easier to monitor the intruders (Fontijn, Talstra, Newton & Holtman, 2015). The same license can be established to all the workers to make all the groups of the entrepreneurship obtain access.

The establishment of access control techniques is a recommendable mechanism to the Sony company. The techniques help in maintaining the complex computing environment. It is used to work towards securing the cloud data. For adequate data protection in any organization, the nature of the information to be used should be understood before putting it into practice. The established mechanism used in the access control helps in the identification and categorization of the security strategies needed for the protection to be adequate (Jakimoski, 2016). Management of this information should be implemented for a manageable process in protecting sensitive information. The encryption of confidential information is also a recommendable way of improving data protection security. Data encryption in the organization will help to maintain the integrity of the information and the confidence in the data.

Jay – Determine the primary considerations that an organization would need to take into account when developing the security policies involving bring your own device (BYOD), portable and mobile devices.

The first consideration is the security of the organizations network. Another consideration is loss of organizational data by a device being stolen. Additional consideration is for the development of security policies for BYOD is the threat of malware. Also, the potential to have unauthorized access into different areas of an organizations network.

List and examine the major challenges of enforcing policies concerning BYOD, portable and mobile devices.

The risks associated with BYOD has to be addressed by an organization prior to implementing it. One risk associated with BYOD is if the personal device is loss or stolen the company may not be able to stop the any information in the devices from being compromised. A company not having a BOYD policy is a major risk. Almost 60% have no personal device policy in place, and, among those with policies, 24% make exceptions for executives, who may handle even more sensitive data; as a result, these organizations are more vulnerable to data loss and serious compliance issues (NetworkWorld Asia, 2013). Another risk is when employees gain access to the network that have been banned by their organization. According to Westervelt (2013), “organizations that restrict certain devices from network access may find employees using a workaround to tie into corporate resources; certain mobile apps can enable employees to trick network access control checks.” Failure to update security software by BYOD users is a risk and companies need to have policies in place to ensure the BYOD users are made aware of the requirements are for their allowed use of their devices.

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter


1. Professional & Expert Writers: Eminence Papers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Eminence Papers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Eminence Papers are known for the timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Eminence Papers, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

We Can Write It for You! Enjoy 20% OFF on This Order. Use Code SAVE20

Stuck with your Assignment?

Enjoy 20% OFF Today
Use code SAVE20