Question

• A security domain is a related group of IT objects protected by a common security...

• A security domain is a related group of IT objects protected by a common security policy Generally, these IT objects are controlled by one access control mechanism. Many applications span security domains. Is this a good idea? How is this important to other audit issues like cloud, bring your own device (BYOD), etc. Pick a BYOD device and comment on at least two vulnerabilities for that device if a company allows its use as a personal device as well. What controls would you want to implement on the BYOD?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

BYOD(BRING YOUR OWN DEVICE):

BYOD is widely confined to IT sector,which refers to the employees who bring their own device to do the work.

BYOD COMPUTING DEVICES:

1.smartphone

2.laptop

3.tablet etc,..

IS THIS A GOOD IDEA?

As every coin has Head and Tail,this BYOD has pros and cons.but,many of them are cons.

PROS:

1.it increases best practices of work.

2.increase productivity

3.it allows employees to familiar with technology can help recruiting happy workers.

4.Cost saving:buying electronics by company.

5.worker satisfaction

CONS:

1.Security risks:leakage of data

2.privacy issues:less control over appliation used and they might be malware on apps

3.Burden to IT staff:one shouls familiar with many devicces and OS

4.Damage:if the personal device got stuck or damage,the entire work may stop(Device Infection).

5.Cloud:there might be problem providing security to the data.

6.Lack of management:there might be loss of control and cannot be managed properly.

CONTROLS YOU WANT TO IMPLEMENT ON THE BYOD:

1.KNOW COMPLEATELY ABOUT BYOD

  • one should know compleately about the byod and implementation shouls be on proper diagnosis.

2.CREATE YOUR OWN POLICY

  • one should create their own company policy to restrict risks

3.RESTRICTION FOR SOME DEVICES

  • one should restrict some devices which may be damaged or hang in between the work

4.SEPERATE COMPANY AND PERSONAL DATA

  • the company shouls seperate its personal data ,not to be hacked or robbed.

5.PROTECTION OF EMPLOYEE DATA

  • the company should protect the emmployee data,to provide safety and security to them

6.FOLLOW SOME SECURITY POLOCIES AND GUIDLINES

  • one should follow some policies and instructions.and make employees to confined to it.
Add a comment
Know the answer?
Add Answer to:
• A security domain is a related group of IT objects protected by a common security...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Physical Security we will survey the security issues identified with the offices, that is, the framework...

    Physical Security we will survey the security issues identified with the offices, that is, the framework and utilities we requirement for our business, and how we can continue giving them at the same quality with no interference. It's implied that you ought to begin with an all around outlined occurrence reaction, calamity recuperation, and business congruity arrangement. In the event that you review the discourses from the security arranging module (part 4), excess is the catchphrase in all answers for...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • Area Act Date Description Telecommunications Telecommunications Deregulation and Competition Act of 1996—an update to Communications Act...

    Area Act Date Description Telecommunications Telecommunications Deregulation and Competition Act of 1996—an update to Communications Act of 1934 (47 USC 151 et seq.) 1934 Regulates interstate and foreign telecommunications (amended in 1996 and 2001) Civil legal evidence Federal Rules for Civil Procedure (FRCP) 1938 As updated in 2006, specifies requirements for the storage, protection, and surrender of discoverable electronic data as used in federal civil proceedings Freedom of information Freedom of Information Act (FOIA) 1966 Allows for disclosure of previously...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • AVIVA Information Technology Strategy Aviva is the fifth-largest insurance group worldwide. It provides savings, investments, and...

    AVIVA Information Technology Strategy Aviva is the fifth-largest insurance group worldwide. It provides savings, investments, and insurance, and has been operating since 1696. The company’s 54,000 employees serve more than 50 million people in 28 countries. In order to integrate the organization at a global level, Aviva needed a platform to be able to communicate with all employees and to allow its employees to be able to share best practices. Aviva wanted to encourage its employees to be innovative and...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • Identify 8 issues in regards to Recruitment and Selection, 3 issues for Labour Relation in the...

    Identify 8 issues in regards to Recruitment and Selection, 3 issues for Labour Relation in the following case study : You have recently been hired as an HR Consultant in the new HR Department of Outrage Video Games. Outrage is a five year old, upstart company, run by two very bright young men - Will Bates – President, and his best friend Steve Cobbs, Vice President. This is a very exciting change for you because Outrage, which literally started in...

  • What an Executive Summary Is An executive summary is a specific type of document that does...

    What an Executive Summary Is An executive summary is a specific type of document that does two things: it summarizes a research article, and it offers recommendations as to how information from the article can be used. Some long reports can contain an executive summary section, as indicated in the Pearson handbook. Write a 2 pahe Executive Summary In business contexts, an executive summary is always written for a specific purpose: to explain the information in the article to a...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT