Question

Develop a security policy that addresses BYOD, USB thumb drives, and email. This should be one...

Develop a security policy that addresses BYOD, USB thumb drives, and email. This should be one page.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Security Policy for BYOD:

Whenever there is a Bring Your Own Device scheme in the workplace there must be a security policy generated because we don't know what does their device consists of and how will it react to the environment. So, here are some of the measures to mitigate the risks of BYOD.

  • The first and foremost thing to do is to encrypt all the business data which stored in the personal devices with the strongest encryption algorithms. I would suggest going with the full device encryption if feasible for the particular environment.
  • The software and all the utility applications must be kept updated so that no zero-day vulnerabilities will be able to hack up the devices we are using in the environment.
  • A pre-checkup of the device before registering it to the network must be done with all the data of the particular device so that it becomes easy to identify the device on the network and the administrator can keep track of the devices and their activities in the network.
  • One must also authenticate the devices with the help of the SSL(Secure Socket Layer) which will be very effective before they are being allowed to access the network resources.
  • One must also minimize the use of personal email accounts and also social network websites or all the websites and application which may have chances to transmit any of the business information in even minor terms.

Hence, these are some of the security policies one must develop in case of BYOD.

Add a comment
Know the answer?
Add Answer to:
Develop a security policy that addresses BYOD, USB thumb drives, and email. This should be one...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Develop a crawler that collects the email addresses in the visited web pages. You can write...

    Develop a crawler that collects the email addresses in the visited web pages. You can write a function emails() that takes a document (as a string) as input and returns the set of email addresses (i.e., strings) appearing in it. You should use a regular expression to find the email addresses in the document. Explain the code and how it works.

  • (Python) Develop a crawler that collects the email addresses in the visited web pages. You can...

    (Python) Develop a crawler that collects the email addresses in the visited web pages. You can write a function emails() that takes a document (as a string) as input and returns the set of email addresses (i.e., strings) appearing in it. You should use a regular expression to find the email addresses in the document. Explain the code and how it works.

  • Q2- When should a company develop a vender Information Security Policy?

    Q2- When should a company develop a vender Information Security Policy?

  • Research the IT security policy used by your university or by some other organization you are...

    Research the IT security policy used by your university or by some other organization you are associated with. Identify which of the topics listed in Section 14.2 this policy addresses. If possible, identify any legal or regulatory requirements that apply to the organization. Do you believe the policy appropriately addresses all relevant issues? Are there any topics the policy should address but does not? [Note;  if you are unable to have direct access to an organization try to look one up...

  • Everybody knows that email is important, but should each company develop, own, support, and maintain its...

    Everybody knows that email is important, but should each company develop, own, support, and maintain its own email infrastructure, or should it instead use lower-cost or free services? That is the question that Michael Jagger, CEO of Provident Security, faced as he contemplated a costly upgrade of the company’s internal email infrastructure. Founded in 1996 by Michael Jagger as a way to pay his undergraduate tuition, Provident started out as a company that provided special event security. Today, it has...

  • As part of your course project, you are to develop, and design your overall security policy...

    As part of your course project, you are to develop, and design your overall security policy strategy. Instructions Identify a complete list of security standards that must be addressed in a comprehensive solution for the organization. Discuss legal and regulatory issues that must be considered in relation to the management of information assets. Identify the steps that you took throughout the quarter to ensure that your security solution will succeed internationally and describe how you addressed globalization in your security...

  • Your supervisor has asked you to write a brief email on the vacation policy changes to...

    Your supervisor has asked you to write a brief email on the vacation policy changes to be distributed to staff. You will need to listen to a voice mail from your supervisor with instructions on how to create the email to announce the new vacation policy. The voice mail will include specific details that must be followed in creating the email. Listen to your supervisor’s voice mail here. Company policy change Vacation policy change employer with fewer years of service...

  • Organisations should develop, implement and monitor their own employee relations policy. This should be unique to...

    Organisations should develop, implement and monitor their own employee relations policy. This should be unique to their organisation and to their business. Clearly the policy will be important in skewing the company to their chosen market. What are these employee relations policy?

  • The help desk informed a security analyst of a trend that is beginning to develop regarding...

    The help desk informed a security analyst of a trend that is beginning to develop regarding a suspicious email that has been reported by multiple users. The analyst has determined the email includes an attachment named invoice.zip that contains the following files: Locky.js xerty.ini xerty.lib Further analysis indicates that when the zip file is opened, it is installing a new version of ransomware on the devices. Which of the following should be done FIRST to prevent data on the company...

  • QUESTION 1 (30) Define, discuss and develop an Information Security Policy with all its elements. QUESTION...

    QUESTION 1 (30) Define, discuss and develop an Information Security Policy with all its elements. QUESTION 2 (30) Online payment systems for consumer electronic commerce are still evolving. Online businesses must offer their customers payment options that are safe, convenient, and widely accepted. Discuss some of the online payment methods these businesses offer.

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT