Dhrumil your work, do you think that it


Id: 2832658

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now



Assignment #9

Organizations globally are adopting the concept of BYOD (Bring Your Own
Device). enabling users to compute using cloud technologies and use Web-based
tools including social media sites as a way to do business, share knowledge,
conduct training, and communicate. Many of these organizations are mandating
that you either install software on your device to protect their interest or
not access these systems at all. The software captures every action taken to
ensure the enterprise backbone (be it the school or corporation) is safe.

  Two Questions

• If you are the
owner of a device (i.e. iPhone, iPad, Laptop etc) or even work remotely using
your own telecommunications provider (i.e. high speed Internet) to conduct your
work, do you think that it is appropriate to put restrictions on the user? Why
or why not?

Now days every company or organization are
providing Device (I.e  : iPhone, iPad,
Laptop) to  their employee just because
of company security.  If the company will
give permission to every employee to use their own device for company work so
company have to tell every employee to install company software for to secure
company policy and privacy. Even they have to put few restrictions to owner
device, because the company data will stay secure. If the owner is using their
own device and telecommunications (speed internet) so it might have get data
breach chances.  For remotely work
company is providing VPN(Virtual Private Network) access to every employee. If
owner want to work by their own communication provider they can work but company
will restrict to their device. Somehow owner cannot use everything form company
data, in his or her own telecommunications network.

BYOD isn’t all wine and roses, however. There
are a few issues to consider also. By grasping BYOD, associations lose a
significant part of the control over the IT equipment and how it is utilized. Organization
issued IT commonly accompanies an adequate utilize approach, and it is ensured
by organization issued security that is overseen and refreshed by the IT
office. It is somewhat trickier telling a worker what is or isn’t, an
“adequate use” of their own devices. Ensure you have a clearly
characterized arrangement for BYOD that layout the guidelines of engagement and
states in advance what the desires are. You should likewise lay out least
security requirements, or even order organization authorized security tools as
a condition for enabling individual devices to associate with organization data
and system assets.



• What do you think
is the happy medium? Should the organization also control and own the data – or
is it the device owner who owns the data and responsible for securing that

From my point of view I think both are
responsible for the secure company data. If company is providing device to
their employee then they ensure that company employee will not miss use data. Company
has to secure their data by their own. Employee also has to secure company
data. It is owner responsibility that he or she whenever they use company data
or device in their own telecommunicates network data and device will not breach
or steal.

Company or Organization also require install
antivirus software on owner’s own device, to provide technical support to the
employee on their own device, when they use for company purpose and in place a
BYOD accept use policy provide guidance to owner to how they can use their own
device while working with company and personal data. Company also has to monitor
while BYOD policy apply. They have to ensure and track the device to secure the
company data. Monitoring like cloud, record location of the personal device,
also monitoring network traffic.

After all of this company is responsible for the
security of company data and data protection is require careless of the
ownership of the device and there for need to responsible with BYOD


















Schools and training
organizations constantly push for the use of social media as a learning agent.
Yet, social media is often considered the “wild west”. The “wild west” includes
access to downloads that can be virus prone, links that take you to spam-like
content and/or opt-in list, or systems that can compromise not only computer
security but the server which is controlling Internet traffic. 


One Question

• What kind of
policies would you implement to ensure people in your organization are safe in
the world of social media, and that organizational infrastructure is not
compromised by a social media security breach?

Social media offer advantage and disadvantage to
company and organizations, but companies have to make secure policy because it
has common security risk. But many of company or organization are not sure that
how to make social media policy. Many of company or organization simply banned
social media use or have no policy on use of social media. Both of these
approaches are not safe. If company or organization that do not adopt social
media fail to significant benefits and disadvantage to their competitors and they
allow without any social media policy they security threats issue. To avoid
security breach organization has to moderate through appropriate and consistent
end-user practices. They also have to arrange good security awareness program
and apply organizational security policies.

Security policies must reflect current advances
and business forms.  But all policy is
toothless without compelling requirements. Even company employee has to strictly
follow that policy. They reluctantly acknowledge this conduct, knowing
regardless that there is little they can do to counteract it. Organization or company
have to create new set tool that tool will suited with modern business
environment of social media and mobile both always have to connected with that



I'm William!

Would you like to get a custom essay? How about receiving a customized one?

Check it out