Prepare a security policy for your organization

Assignment Help Computer Network Security
Reference no: EM131394468

Your boss has asked you to prepare a security policy for your organization addressing a new option he wants to pilot - Bring Your Own Device (BYOD). He wants to allow users to use their own laptops and cell phones for work purposes.

Research issues associated with BYOD. Your deliverable for this assignment consists of two parts:

- The first is a 1-pageissues identification paper for your boss. Write a minimum of a 1page (1.5-spaced) paper on the issues identifying at least 10 potential security and other concerns associated with BYOD. Be certain that this paper is properly cited and do not address just mobile security issues - address issues associated with BYOD.

- As you know that your boss is going to do whatever he wants, regardless of your concerns, prepare a BYOD policy for the organization that identifies at least 10 controls to the concerns that you raise in the paper (be certain to use "strong" policy language) to which you expect users to adhere. Use the template provided to you below and be certain that you address all of the sections in the template (remove the yellow highlights).

Bring Your Own Device (BYOD) Policy

Introduction - State the purpose of this policy (what is it expected to achieve?)
Effective Date - Provide an effective date for the policy

Audience - Who is the audience (to whom will this apply?)Use the roles that were specified in the lecture (in the text)

Background - Provide some background to the reader on why the organization is establishing this policy (mention the risks that would be associated with allowing users to bring in their own devices and attach them to the network).

Definitions - Include necessary definitions (define all acronyms and technical terms as the readers may not be that computer literate)
- Term 1
- Term 2
- ETC....

Bring Your Own Device (BYOD) Policy - Specify your policy statements (at least 10).

Disciplinary Actions - Address the measures that the company will take if a user is found not be in compliance with this policy.

References
Cite any references used for the homework (any works used to identify the risks or any standards documents that may be relevant). You must have at least 3 external references that support the research you did for this assignment.

Verified Expert

The paper is about BYOD policy which is to be implemented in an organization. According to BYOD policy, the employees can bring their own system in an office for the professional use. There are various advantages as well as disadvantages of implementing BYOD policy. Few of its advantages include - the organization can lower the overall cost of the system resources. They don't require to spend on the updates of the software. The employees can be available at any time. They can also work on odd hours. It decreases the waiting time for the clients as well. The major disadvantages include security concern to the organization. The major issue is the confidentiality of data. The employees can leak the data of the organization. BYOD systems are more prone to vulnerabilities or virus. So by implementing some policies BYOD can be implemented successfully.

Reference no: EM131394468

Questions Cloud

Describe the center and spread of the distribution : How many cars were measured?- Why might the mean be so much larger than the median?- Describe the center and spread of this distribution with appropriate statistics.
Analyse nike webpage : Follow these steps to complete the activity properly: Analyse Nike's webpage. Analyse this page's digital presence regarding social networks, such as Facebook, Instagram, etc
How are key concepts of socialization related to situation : How are the key concepts of socialization related to this situation? Explain. What do you think might happen to Victor should he accept the position? What responsibility does Victor have when interviewing for a position such as this?
Create appropriate graphical displays for both groups : Create appropriate graphical displays for both groups, and write a brief report comparing their cholesterol levels. Here are the data:
Prepare a security policy for your organization : Prepare a security policy for your organization addressing a new option he wants to pilot - Bring Your Own Device (BYOD). He wants to allow users to use their own laptops and cell phones for work purposes.
Find the summaries of equivalent sat scores : An admissions officer reported the following statistics about the ACT scores of 2355 students who applied to her college one year. Find the summaries of equivalent SAT scores.
Find the range and the iqr of the weights : Find the range and the IQR of the weights.- Do you think the distribution of the weights is symmetric or skewed? If skewed, which way? Why?
Tell the new value of each of the summary statistics : Suppose business has been good and the company gives every employee a $50 raise. Tell the new value of each of the summary statistics.
Define a sponsorship policy approach for a brand : In this activity, you will to define a sponsorship policy approach for a brand within your national market and list her according to main objectives

Reviews

inf1394468

2/21/2017 5:05:45 AM

ExpertsMind.com, I truly getting a charge out of composing my own papers, yet needed to change my unique point and had negligible time for consummation because of my work. Your group has never fizzled me. Many many thanks.

len1394468

2/15/2017 2:45:57 AM

Hi there, Please find attached as the assignment question with all requirements. This paper should contain 2 parts: the first part should be at least 1 page (1.5 line spacing, font 12) and the 2nd part is creating the BYOD Policy (using the template provided) The deadline is 15 (20 hours from now) Thank you

len1394468

2/15/2017 2:45:40 AM

Levels of Achievement Criteria Novice Competent Proficient Formatting 0 % 50% 100% Weight No A different template is used other than dal is provided for the policy. Policy template is used. Letter is well-formatted. Sources are appropriately cited. 20.00% submission Sections in the policy are incomplete. Relevancy 0% 50% 100% Weight No Some of the issues are only relevant to mobile phones, in general, Both the BYOD Policy and letter address relevant issues associated with BYOD 20.00% submission and do not address BYOD issues. policy and not, just, mobile security issues. Grammar 0% 50% 100 % Weight No The policy or letter may have language that is confusing to the Policy is ell-written and easily understood . Strong policy language is used. 20.00% submission reader, or the policy language is weak and ambiguous as to whether or not the user is expected to follow it. Completeness 0% 50% 100 % Weight No Submission is missing either the policy or the issues paper to the Policy contains both a one-page letter to the boss identifying the issues associated 40.00% submission boss or fewer than 10 issues are identified andlor addressed.

Write a Review

Computer Network Security Questions & Answers

  Question on security infrastructure and protocols

Question on Security infrastructure and protocols

  Discuss a situation where you received security education

You have probably received some form of information security education, either in your workplace, school, or other settings. Discuss a situation where you received security education. How was it delivered?

  Construct the routing tables at each of the nodes

Construct the routing tables at each of the five nodes - Write a function computeDijkstra(sourceID,C)' which takes as inputs the source node ID and the link cost matrix and returns the final best cost vector and the final predecessor vector.

  Case study incident-response policy-gem infosys

Case Study Incident-Response Policy; Gem Infosys, Gem Infosys, a small software company, has decided to better secure its computer systems after a malware attack shut down its network operations for 2 full days

  What is the entropy of the plaintext message

A foreign navy has implemented a secure communications system in which submarine commanders transmit a single 5-letter message every day. The messages may only use capital (English) letters, and all messages are equally probable.

  Define and describe voip and virtual private networks and

1. list and describe the principal internet services.2. define and describe voip and virtual private networks and

  Explain a network storage technology

Explain a network storage technology that can use the existing network to make data on network-connected hard disks accessible to company users.

  Discuss some of the problems nats create for ipsec security.

Why deployment of IPv6 has been slow to date

  Security of information in business organisations

Definitions and descriptions of the terms, 'integrity', 'availability' 'confidentiality', 'authenticity' and 'non-repudiation' in relation to the security protection of information assets in the chosen topic environment, i.e. what is it about thes..

  Relationship between technical or it staff

Determine what your relationship would be like with the technical or IT staff at your corporation if you were working side by side on a project or training exercise?

  What is cybersecurity and is it necessary

What is Cybersecurity and is it necessary.Explain breifly

  Determine impact of at least five potential logical threats

Determine the impact of at least five (5) potential logical threats that require attention. Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd