BRING YOUR OWN DEVICE SECURITY ISSUES
Bring your own device (BYOD) to work has gained increased popularity and is in use in many organizations. Along with this convenience for employees are some major security issues for cyber security professionals.
RESOURCES
Be sure to review the Learning Resources before completing this activity.
Click the weekly resources link to access the resources.
WEEKLY RESOURCES
To prepare for this Discussion:
Review your experiences with BYOD.
Then search the Walden library and the Internet for security issues related to BYOD.
Identify some of the best BYOD practices organizations have implemented to protect organizational data.
BY DAY 3
Post, in APA format, an analysis of how BYOD policies are causing organizational network issues. In 300–400 words:
Identify 2 or 3 top security concerns, issues, and best practices being implemented to protect organizations.
Share your experience with BYOD and whether they follow these best practices.
Refer to the Week 3 Discussion Rubric for specific grading elements and criteria. Your Instructor will use this grading rubric to assess your work.
Read a selection of your colleagues’ postings.
LEARNING RESOURCES
Required Readings
Turban, E., Pollard, C., & Wood, G. (2021). Information technology for management: Driving digital transformation to enhance local and global performance, growth and sustainability (12th ed.). Wiley.
oChapter 2, “Information Systems, IT Infrastructure, and the Cloud” (pp. 31–65)
oChapter 4, “Networks, the Internet of Things (IoT), and Edge Computing” (pp. 107–148)
Cisco. (2012). University embraces bring-your-own-device with wireless networkLinks to an external site.. http://www.eschoolnews.com/files/2012/06/UniversityEmbracesBringYourOwnDevice.pdf
CSO Staff. (2022, May 25). Security and privacy laws, regulations, and compliance: The complete guideLinks to an external site.. https://www.csoonline.com/article/3604334/csos-ultimate-guide-to-security-and-privacy-laws-regulations-and-compliance.html
Devane, H. (2021, June 29). The complete guide to data security compliance laws and regulationsLinks to an external site.. https://www.immuta.com/blog/the-complete-guide-to-data-security-compliance-laws-and-regulations
Miller, A., & Raza, M. (2022, January 28). Bring your own device (BYOD): Best practices for the workplaceLinks to an external site.. The Business of IT Blog. https://www.bmc.com/blogs/byod-policies
Optional Resources
Bring your own deviceLinks to an external site.. (2012). https://obamawhitehouse.archives.gov/digitalgov/bring-your-own-deviceLinks to an external site.
Walden University. (n.d.). APA style: OverviewLinks to an external site.. https://academicguides.waldenu.edu/writingcenter/apa
Walden University. (n.d.). Reference list: Common reference list examplesLinks to an external site..https://academicguides.waldenu.edu/writingcenter/apa/references/examples
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
