Value: 20% Due Date: 14-Sep-2018 Return Date: 09-Oct-2018 Length: XXXXXXXXXXwords (Excluding references) Submission method options: Alternative submission method Task In this assessment, you are...

1 answer below »
I have attached part 1 of this assignment by the name of BYOD Security.


Value: 20% Due Date: 14-Sep-2018 Return Date: 09-Oct-2018 Length: 1500-2000 words (Excluding references) Submission method options: Alternative submission method Task In this assessment, you are required to provide a complete report of your research project, that you chose in Assessment 3 (Research Project Abstract) by discussing the following aspects: · Overview of the topic · Relevant technologies and applications of those technologies · Highlighting the challenges/problems in your chosen research area · Identification of any gaps in the literature by: · discussing areas/issues that you believe have been addressed in the current literature; · highlighting areas/issues that have not been addressed or adequately addressed; and · discussing your view(s) on the issue(s) that you see as being critical. · Summarize the future research directions based on the identified research gaps To accomplish the above, you are expected to read and critically evaluate recent research in your selected research area by citing a minimum of 7 research articles. Students are encouraged to access such research articles from well-known and reputed research portals such as IEEE, ACM, Springer, Science Direct etc. Please note Wikipedia and general blogs will not be considered as acceptable citations. Your report should include the following sections. A template will also be made available in the Resources section of your subject Interact2 site. Abstract (As submitted for Assessment 3) Your abstract should briefly summarize the aim, findings or purpose of the report. This will provide an overview of your selected topic, along with key security challenges in that area, the focus of your investigation and why it is important. Keywords Three to seven keywords representing the main content of the report. Introduction The Introduction section should explain the background to the report, its aims, a summary of the relevant existing literature and the issue/issues under discussion. Main text This should contain the body of the report and should be broken into appropriate subsections with short, informative headings and sub-headings. Conclusions This should clearly mention the main conclusions and include an explanation of their relevance or importance to the field. References List the references used in your research. Rationale This assessment task will assess the following learning outcome/s: · be able to justify security goals and the importance of maintaining the secure computing environment against digital threats. · be able to explain the fundamental concepts of cryptographic algorithms. · be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats. · be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system. · be able to investigate and justify the use of the access control mechanisms and user authentication processes. · be able to compare and contrast foundational security policies and models that deal with integrity and confidentiality. This assessment continues from/links back to Assessment 3 where students initiated their research project by selecting a research topic in an emerging area of information security. The aim of this task is to help students : · to demonstrate the ability to integrate and apply information from various topics; · to build an understanding and perspective of current and emerging topics in Information Security; · to help the students to formulate their research project in a step by step manner; and · to build generic skills including, critical thinking, analysis, problem-solving in the context of Information Security. Presentation Care must be taken to avoid direct quotes from sources. No marks will be awarded for any answer containing more than 10% direct quotes (referenced or not referenced). APA reference style must be used throughout the document with the bibliography at the end of the document. In-text citations should also follow APA style. BYOD security In this assignment we will focus on the new concept of BYOD short form of “Bring Your Own Device”, the latest trend in enterprise practice of allowing employees to bring their own mobile devices to use at work within companies. This practice let employee’s personal mobile to integrate with company systems, networks and sensitive information. BYOD comes with lot of advantages, where it has made it easier for companies on their IT issues, reduced operating cost, increased productivity by giving flexibility to employees to work on the go and make it easier for employees to work remotely. Employees use their own devices to connect to company systems and check emails, check systems etc. Although the new trend has its benefits on the other hand this new trend comes with its own security and privacy risk and issues. BYOD has put companies at the risk of data breaches and at more risk of leak of sensitive information. The biggest challenge on companies is to maintain the privacy and security of several devices used by various employees across the firm. Due to the mobility of these devices, security has become more challenging and it is far more difficult to maintain security integrity across these devices. Companies data become vulnerable if the information is not secured over these devices. Due to the greater number of devices it becomes challenging to control the information available on them and as per any other device information stored on them can be hacked. In this report we will discuss in detail the security risk and the consequences companies might have to face if the security is not maintained on these BYOD devices and what policies can be put in place to reduce the risk of security breach. Reference: https://www.veracode.com/security/byod-security
Answered Same DaySep 10, 2020

Answer To: Value: 20% Due Date: 14-Sep-2018 Return Date: 09-Oct-2018 Length: XXXXXXXXXXwords (Excluding...

Abr Writing answered on Sep 11 2020
139 Votes
Title: BYOD Security
Author:
Course:
Submission Date:
Table of Contents
Abstract    3
Key Words    3
Introduction    4
Literature Review    4
Literature Reviewed: Areas Addressed    5
Literature Reviewed: Gaps    5
BYOD Security: Critical Issues    6
Threat Prevention    7
Conclusion    8
Reference List    9
Abstract
In this assignment we will focus on the new concept
of BYOD short form of “Bring Your Own Device”, the latest trend in enterprise practice of allowing employees to bring their own mobile devices to use at work within companies. This practice let employee’s personal mobile to integrate with company systems, networks and sensitive information.
BYOD comes with lot of advantages, where it has made it easier for companies on their IT issues, reduced operating cost, increased productivity by giving flexibility to employees to work on the go and make it easier for employees to work remotely. Employees use their own devices to connect to company systems and check emails, check systems etc. Although the new trend has its benefits on the other hand this new trend comes with its own security and privacy risk and issues.
BYOD has put companies at the risk of data breaches and at more risk of leak of sensitive information. The biggest challenge on companies is to maintain the privacy and security of several devices used by various employees across the firm. Due to the mobility of these devices, security has become more challenging and it is far more difficult to maintain security integrity across these devices. Companies data become vulnerable if the information is not secured over these devices. Due to the greater number of devices it becomes challenging to control the information available on them and as per any other device information stored on them can be hacked. In this report we will discuss in detail the security risk and the consequences companies might have to face if the security is not maintained on these BYOD devices and what policies can be put in place to reduce the risk of security breach.
Key Words
BYOD, Threat, Security, Mitigation, Data, Mobile Device Management, Governance
Introduction
BYOD or Bring Your Own Device is increasingly becoming popular in the enterprise environment. The companies instead of spending on workstation devices like mobile, laptop, iPad, USB etc. are allowing employees to carry their own devices. This allows them to not invest in the purchase and procurement of these employee devices and at the same time the employees enjoy working seamlessly on their own devices. This phenomenon was first introduced in the market in 2009 by Intel but it only gained traction once companies like Unisys and Citrix accepted and enabled this for their employees in 2011. After that other companies started following the same and that created a trend within the industry of allowing employees to bring their own devices to work. (Disterer & Kleiner, 2013)
Literature Review
After analyzing many journals on BYOD Security, Mobile Device Management etc. and others in the same field, 7 research articles were shortlisted. They were then researched upon and analyzed from the below perspective.
The journals talk in depth about the benefits that BYOD provides to the employees and the company. They have detailed out use cases of how the cost is being saved and what does that translate to the employee satisfaction. The various benefits described are primarily grouped into the following 4 major points: (Kumar, 2016)
1. Improvement in satisfaction of employees
2. Increase in the productivity of...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here