-
Essay / Bring Your Own Device Model Review
BYOD is trendy, cost-effective, and employee-friendly. Intel, on the other hand, is the world's largest chipmaker and a pioneer in the technology industry. Adopting the BYOD model is a big step forward for Intel because employees are happy and more responsible for their devices. This will also improve employee productivity. Like any other model, BYOD came with its own set of risks. As mentioned in many of our information security courses, no matter the level of security, it is never 100%. Not only did this present technical challenges, but security and privacy were also key BYOD risks. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get the original essay One of Harkins' main concerns is data security. As the case suggests, Intel Corp.-Bring Your Own Devices (p. 1) employees bring their own devices and use them during business hours, making the distinction between corporate data and increasingly vague private data. Additionally, the use of personal devices can also lead to loss of productivity among employees, as mentioned in Intel Corp.-Bring Your Own Device (p. 2). Another vulnerability in enterprise data security is the use of unsecured public data. networks. It is very likely that an employee connects their personal devices to public networks such as in a cafeteria and/or hotel. Even though these networks are attractive to users, they also attract the attention of hackers because it is easy to access these networks with a little software and gain access to all the shared information. According to the IPsec VPN Guide article (p. 2-4), in order to avoid security risks to corporate data, Intel must configure a symmetric cryptography VPN to encrypt corporate data. Keeping note of the vulnerabilities of each encryption method, using the WPA2 encryption method would be the best solution. Six keys to improving wireless security (p. 394). This will help mitigate the risk of unintentional sharing of corporate data from personal devices. As mentioned in Intel Corp.-Bring Your Own Device (p. 2), Harkins saw a certain law that said: "Information wants to be free." This compromises security and CIOs cannot enforce their own rules. We recommend Harkins add some authentication methods when connecting to the company network. As mentioned in the article Digital Identity Guidelines: Authentication and Lifecycle Management (p. 13), when connecting to the corporate network, the user must provide a memorized secret checker. This way, an unknown device/user attempting to connect to the corporate network fails. Accessing data on an employee's personal device can be difficult, as it can lead to a violation of the employee's privacy. And the increased use of smartphones on the corporate network will lead to security breaches and increased risks. According to the article Six Keys to Improving Wireless Connection (Key 2: Require Strong Authentication p. 3), Intel may use strong multi-factor authentication to allow user access to sensitive data. Additionally, applying the COBIT DSS05.03 endpoint security protocol will secure the network and protect the integrity of the system. Changes to the FRCP rules and the recent lawsuit mentioned in the article Intel Corp - Bring Your Own Device (p. 10) trigger a.