Preview

BYOD-Single Most Important Cyber security Vulnerability Facing IT Managers Today

Better Essays
Open Document
Open Document
1208 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
BYOD-Single Most Important Cyber security Vulnerability Facing IT Managers Today
Single Most Important Cybersecurity Vulnerability Facing IT Managers Today
CSSEC610
Professor Chun-I P Chen
March 31, 2013

Table of Contents

Cyber security must be an aggressive and evolving practice. Not only is it important to put security in place for current technology that can access electronic information, but also to look forward to future trends and strategies. Methods must also be developed that will continuously protect information regardless of growth and technological advances. As trends change and new technology develops it is the responsibility of businesses to balance cost saving measures with adequate security measures. Cyber space is any area where data and information is electronically stored or filtered through that can be accessed via a variety of networks, programs, and systems. Cyber is all measures put in place to ensure appropriate use and protection for that information. It is important for organizations to ensure their networks and components within those networks are secure. Each connection to the internet, and each user of the network is a vulnerability to that network. In today’s economy with corporate scandals, government crackdowns, financial cutbacks, and new implementation of policy the single most important vulnerability facing IT managers today is the idea of bring your own device (BYOD). BYOD implementation seems like a viable option for various companies, businesses, and educational institutions worldwide. This practice appears to save money for the company. It also increases portability and access for employees. BYOD is a forward thinking and innovative solution. As these entities grow, their hardware/software needs increase what better way to eliminate high costs.
BYOD
What is BYOD? Bring your own device is where users, which may be students or employees, are empowered by their organizations to use their personal cell phones, tablets, and/or laptops for that



References: Bishop, M., Engle, S., Frincke, D. A., Gates, C., Greitzer, F. L., Peisert, S., & Whalen, S. (2010). A risk management approach to the 'insider threat '. Advances in Information Security, 49, 115-137. doi: http://dx.doi.org/10.1007/978-1-4419-7133-3 Drew, J. (2012). Managing cybersecurity risks. Journal of accountancy, 214(2), 44-48. Gatewood, B. (2012). The nuts and bolts of making byod work. Information Management Journal, 46(6), 26-30. Generation byod [infographic]. (2012, December 19). Retrieved from http://www.tappin.com/blog/tag/byod/ Hanson, W. (2012). Byod: Resistance is futile. Government technology, 25(12), 17. Hayes, J. (2012). The device divide. Engineering & Technology (17509637), 7(9), 76-78. Neagle, C. (2013). Disasters. Network World, 30(4), 20. Schachter, R. (2012). Creating a robust and safe byod program. District Administration, 48(4), 28-31 Valacich, J., & Schneider, C. (2012). Information systems today managing in the digital world. (5th ed., p. 36). Upper Saddle River, New Jersey: Prentice Hall.

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Better Essays

    CMGT 445 Week 2 IA

    • 814 Words
    • 3 Pages

    Valacich, J., & Schneider, C. (2012). Information Systems Today: Managing In the Digital World (5th ed.). Upper Saddle River, NJ: Prentice Hall.…

    • 814 Words
    • 3 Pages
    Better Essays
  • Better Essays

    References: Valacich, J., & Schneider, C. (2012).Information systems today: Managing in the digital world(5th ed.). Upper Saddle River, NJ: Pearson Education.…

    • 1043 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The purpose of this paper is to explore and assess computer security as it relates to Aircraft Solutions. Aircraft Solutions provides products and services to a range of companies that require highly specialized skills. Information is accessed by internal and external users via their Business Process Management system.…

    • 1345 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment

    • 4104 Words
    • 17 Pages

    However, there is growing interest in protocols and other mechanisms for use with novel telecommunications services. Next-generation value-added services are bound to introduce new vulnerabilities. The interaction between all these communications and security protocols, and the mechanisms used for distributed systems security, is fertile ground for both interesting research. Ways to enhance these protection tools to make sure our technology is safe from IT attacks are evolving all the time. The systems or measures used to protect a company system at present might not be of any use in the future as technology is always enhancing to higher levels. Telecommunication businesses tend to be comparatively adept at managing information security risks. And many are taking action to achieve an enhanced level of ongoing insight and intelligence into ecosystem vulnerabilities and dynamic threats. Companies like Celcom must be ready to invest in this expensive research so as to be able to aggressively compete in the intense telecommunication market and to be able to sustain itself in this industry. Today, information security is a discipline that demands advanced technologies and processes, a skill set based on counterintelligence techniques, and the unwavering support of top executives. As telecom operators become more similar to technology companies, they will face a raft of new challenges. Core practices like employee awareness and training, policies and tools to reduce insider risks, and protection of data, including intellectual property, will need to be updated. The confluence of mobility, cloud, and social networking have multiplied risks, yet few operators have addressed these threats or deployed technologies that monitor user and network activity to provide insight into ecosystem vulnerabilities and threats. These…

    • 4104 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Common security countermeasures typically found in an IT infrastructure  Risk assessment approach to securing an IT infrastructure  Risk mitigation strategies to shrink the information security gap NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 3 EXPLORE: CONCEPTS NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett…

    • 299 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    This Learning Team Project requires students to develop a semi-quantitative, weighted analysis that generates a comprehensive threat/vulnerability analysis of enterprise security, along with appropriate security measures and recommendations. Additionally, the readings provide background information supporting various techniques, as well as how to do assessments, how to create rankings, and so forth. These readings should be previewed as early as possible, rather than waiting for the specific week. The Enterprise Security Plan is due in Week…

    • 2331 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    Not only am I pursuing a Cybersecurity degree from the University of Maryland University College, but I am planning on making a lifetime career in this particular field, which means I am taking every opportunity possible to learn as much as I can about this career field, and frankly do so with serious passion and dedication. Cybersecurity is one of the few blossoming fields within the U.S. and abroad now in days with all of the new technological advances being made every single day as well as the newly constructed, successful Cybersecurity companies. Every company that wants to protect their classified information hires a Cybersecurity team to keep that information safe and out of the hands of people that could do wrong with that information; even the U.S. government has a massive Cybersecurity program as part of our National Defense to…

    • 824 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Byod

    • 3852 Words
    • 16 Pages

    Hospital IT organizations nationwide are starting to deploy BYOD initiatives that allow hospital-based and affiliated physicians to use their personal mobile devices on the hospital’s wireless local area network (WLAN) to access patient information regardless of their physical location. When…

    • 3852 Words
    • 16 Pages
    Powerful Essays
  • Better Essays

    were in class. There's even an acronym for it: BYOD, or Bring Your Own Device. As…

    • 1467 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    ← Haag S.; Cummings M.; Mccubbery D. (2005) Management Information Systems for the Information Age, 5th Edition, McGraw Hill, New York.…

    • 2488 Words
    • 10 Pages
    Powerful Essays

Related Topics