Preview

BYOD-Single Most Important Cyber security Vulnerability Facing IT Managers Today

Better Essays
Open Document
Open Document
1208 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
BYOD-Single Most Important Cyber security Vulnerability Facing IT Managers Today
Single Most Important Cybersecurity Vulnerability Facing IT Managers Today
CSSEC610
Professor Chun-I P Chen
March 31, 2013

Table of Contents

Cyber security must be an aggressive and evolving practice. Not only is it important to put security in place for current technology that can access electronic information, but also to look forward to future trends and strategies. Methods must also be developed that will continuously protect information regardless of growth and technological advances. As trends change and new technology develops it is the responsibility of businesses to balance cost saving measures with adequate security measures. Cyber space is any area where data and information is electronically stored or filtered through that can be accessed via a variety of networks, programs, and systems. Cyber is all measures put in place to ensure appropriate use and protection for that information. It is important for organizations to ensure their networks and components within those networks are secure. Each connection to the internet, and each user of the network is a vulnerability to that network. In today’s economy with corporate scandals, government crackdowns, financial cutbacks, and new implementation of policy the single most important vulnerability facing IT managers today is the idea of bring your own device (BYOD). BYOD implementation seems like a viable option for various companies, businesses, and educational institutions worldwide. This practice appears to save money for the company. It also increases portability and access for employees. BYOD is a forward thinking and innovative solution. As these entities grow, their hardware/software needs increase what better way to eliminate high costs.
BYOD
What is BYOD? Bring your own device is where users, which may be students or employees, are empowered by their organizations to use their personal cell phones, tablets, and/or laptops for that



References: Bishop, M., Engle, S., Frincke, D. A., Gates, C., Greitzer, F. L., Peisert, S., & Whalen, S. (2010). A risk management approach to the 'insider threat '. Advances in Information Security, 49, 115-137. doi: http://dx.doi.org/10.1007/978-1-4419-7133-3 Drew, J. (2012). Managing cybersecurity risks. Journal of accountancy, 214(2), 44-48. Gatewood, B. (2012). The nuts and bolts of making byod work. Information Management Journal, 46(6), 26-30. Generation byod [infographic]. (2012, December 19). Retrieved from http://www.tappin.com/blog/tag/byod/ Hanson, W. (2012). Byod: Resistance is futile. Government technology, 25(12), 17. Hayes, J. (2012). The device divide. Engineering & Technology (17509637), 7(9), 76-78. Neagle, C. (2013). Disasters. Network World, 30(4), 20. Schachter, R. (2012). Creating a robust and safe byod program. District Administration, 48(4), 28-31 Valacich, J., & Schneider, C. (2012). Information systems today managing in the digital world. (5th ed., p. 36). Upper Saddle River, New Jersey: Prentice Hall.

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Better Essays

    CMGT 445 Week 2 IA

    • 814 Words
    • 3 Pages

    Valacich, J., & Schneider, C. (2012). Information Systems Today: Managing In the Digital World (5th ed.). Upper Saddle River, NJ: Prentice Hall.…

    • 814 Words
    • 3 Pages
    Better Essays
  • Better Essays

    References: Valacich, J., & Schneider, C. (2012).Information systems today: Managing in the digital world(5th ed.). Upper Saddle River, NJ: Pearson Education.…

    • 1043 Words
    • 7 Pages
    Better Essays
  • Better Essays

    The purpose of this paper is to explore and assess computer security as it relates to Aircraft Solutions. Aircraft Solutions provides products and services to a range of companies that require highly specialized skills. Information is accessed by internal and external users via their Business Process Management system.…

    • 1345 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Common security countermeasures typically found in an IT infrastructure  Risk assessment approach to securing an IT infrastructure  Risk mitigation strategies to shrink the information security gap NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 3 EXPLORE: CONCEPTS NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett…

    • 299 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This Learning Team Project requires students to develop a semi-quantitative, weighted analysis that generates a comprehensive threat/vulnerability analysis of enterprise security, along with appropriate security measures and recommendations. Additionally, the readings provide background information supporting various techniques, as well as how to do assessments, how to create rankings, and so forth. These readings should be previewed as early as possible, rather than waiting for the specific week. The Enterprise Security Plan is due in Week…

    • 2331 Words
    • 10 Pages
    Satisfactory Essays
  • Better Essays

    There are many threats a network faces when the IT department allows students to connect to the network or Internet using mobile devices. Some threats affect the campus network only, while other threats directly affect students or employees. For the campus network, threats include…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Just this year we have seen large companies, corporations, and banking institutions which some were thought to be very secure have been broken into. Hackers continue to develop new ways to steal private information and develop these tools with increased simplicity. Hackers use different methods in breaching the security of the companies they target. These methods have increasingly become increasingly more complex and difficult to detect with tools and programs that are developed to detect attacks and intrusions. With the increasing amount of security threats, new ideas and methods continue to be developed to prevent further attacks. Among these methods is security authentication, protection and prevention.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Not only am I pursuing a Cybersecurity degree from the University of Maryland University College, but I am planning on making a lifetime career in this particular field, which means I am taking every opportunity possible to learn as much as I can about this career field, and frankly do so with serious passion and dedication. Cybersecurity is one of the few blossoming fields within the U.S. and abroad now in days with all of the new technological advances being made every single day as well as the newly constructed, successful Cybersecurity companies. Every company that wants to protect their classified information hires a Cybersecurity team to keep that information safe and out of the hands of people that could do wrong with that information; even the U.S. government has a massive Cybersecurity program as part of our National Defense to…

    • 824 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Byod

    • 3852 Words
    • 16 Pages

    Hospital IT organizations nationwide are starting to deploy BYOD initiatives that allow hospital-based and affiliated physicians to use their personal mobile devices on the hospital’s wireless local area network (WLAN) to access patient information regardless of their physical location. When…

    • 3852 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    ← Haag S.; Cummings M.; Mccubbery D. (2005) Management Information Systems for the Information Age, 5th Edition, McGraw Hill, New York.…

    • 2488 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    were in class. There's even an acronym for it: BYOD, or Bring Your Own Device. As…

    • 1467 Words
    • 6 Pages
    Better Essays

Related Topics