CSSEC610
Professor Chun-I P Chen
March 31, 2013
Table of Contents
Cyber security must be an aggressive and evolving practice. Not only is it important to put security in place for current technology that can access electronic information, but also to look forward to future trends and strategies. Methods must also be developed that will continuously protect information regardless of growth and technological advances. As trends change and new technology develops it is the responsibility of businesses to balance cost saving measures with adequate security measures. Cyber space is any area where data and information is electronically stored or filtered through that can be accessed via a variety of networks, programs, and systems. Cyber is all measures put in place to ensure appropriate use and protection for that information. It is important for organizations to ensure their networks and components within those networks are secure. Each connection to the internet, and each user of the network is a vulnerability to that network. In today’s economy with corporate scandals, government crackdowns, financial cutbacks, and new implementation of policy the single most important vulnerability facing IT managers today is the idea of bring your own device (BYOD). BYOD implementation seems like a viable option for various companies, businesses, and educational institutions worldwide. This practice appears to save money for the company. It also increases portability and access for employees. BYOD is a forward thinking and innovative solution. As these entities grow, their hardware/software needs increase what better way to eliminate high costs.
BYOD
What is BYOD? Bring your own device is where users, which may be students or employees, are empowered by their organizations to use their personal cell phones, tablets, and/or laptops for that
References: Bishop, M., Engle, S., Frincke, D. A., Gates, C., Greitzer, F. L., Peisert, S., & Whalen, S. (2010). A risk management approach to the 'insider threat '. Advances in Information Security, 49, 115-137. doi: http://dx.doi.org/10.1007/978-1-4419-7133-3 Drew, J. (2012). Managing cybersecurity risks. Journal of accountancy, 214(2), 44-48. Gatewood, B. (2012). The nuts and bolts of making byod work. Information Management Journal, 46(6), 26-30. Generation byod [infographic]. (2012, December 19). Retrieved from http://www.tappin.com/blog/tag/byod/ Hanson, W. (2012). Byod: Resistance is futile. Government technology, 25(12), 17. Hayes, J. (2012). The device divide. Engineering & Technology (17509637), 7(9), 76-78. Neagle, C. (2013). Disasters. Network World, 30(4), 20. Schachter, R. (2012). Creating a robust and safe byod program. District Administration, 48(4), 28-31 Valacich, J., & Schneider, C. (2012). Information systems today managing in the digital world. (5th ed., p. 36). Upper Saddle River, New Jersey: Prentice Hall.