Preview

Bring your own device

Powerful Essays
Open Document
Open Document
3020 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Bring your own device
Security Control
Organizations that do not have IT oversight managing its employees’ mobile devices unintentionally consent to making their assets vulnerable to attack from uninformed user behaviors like improper configuration and risky wireless connections (Search Consumerization). With the mobile market’s flux state adding new emerging technologies rapidly, companies have had to adjust from having their networks only accommodate few devices. Initially, laptops accessed the network through limited VPN concentrators and desktops provided access points for PDAs through synchronization. With new technologies, single devices now may encase several forms of connections: Ethernet, WiFi, Bluetooth, and 3G. Networks now accommodate off-site users through a myriad of application portals and on-site users connected through Wi-Fi accessibility and Bluetooth-enabled desktops. Each connection form provides a unique opportunity for attack. Under BYOD policies, corporations must institute a comprehensive mobile inventory that they manage device discovery. New technological circumstances create scenarios that single devices utilize several connections and individual employees possess many devices of which they may utilize concurrently.
Wireless Scanners
Wireless scanners identify which devices occupy a company’s premises with Bluetooth or Wi-Fi interface before they attempt an interaction with corporate resources. Bluetooth scanners utilize Discovery protocols to locate close devices that display their compatibility to Bluetooth services. Wireless scanners similarly detect Wi-Fi signals using “stumblers” that employ 802.11 beacons and/or probes that spot Access Points and Ad Hoc (peer-to-peer) nodes. Both methods still omit mobile devices not spending substantial time in use on site. Wireless Intrusion Prevention Systems (WIPS) accommodate for this type of usage for Wi-Fi-based connections. WLAN switches also possess “rogue detection” constantly alarming corporations of

You May Also Find These Documents Helpful

  • Powerful Essays

    Task 3

    • 4254 Words
    • 17 Pages

    Develop mobile device policies/procedure. Implement security safeguards based on policies/procedure documents. Make sure network is designed with mobile devices in mind.…

    • 4254 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    The network administrator and the network security administrator need to be aware of these types of products and how they can be used to create low-cost covert networks in the workplace. The administrators need to be aware of the push-to-talk feature on cell phones and understand, for example, that sensitive documents can be leaked by the use of cell phone cameras. The administrators not only need to be aware of these technologies, but they need to update their policies and procedures so they can take legal action against employees who leak information.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Powerful Essays

    is3110 lab 5

    • 1037 Words
    • 5 Pages

    2. Which scanning application is better for performing a network discovery reconnaissance probing of an IP network infrastructure? inSSIDer is a Wi-Fi network scanner for the 32-bit and 64-bit versions of Windows XP, Vista, and 7. It is free and open source. The software uses the current wireless card or a wireless USB adapter and supports most GPS devices (namely those that use NMEA 2.3 or higher). Its graphical user interface shows MAC address, SSID, signal strength, hardware brand, security, and network type of nearby Wi-Fi networks. It can also track the strength of the signals and show them in a time graph.…

    • 1037 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment

    • 4104 Words
    • 17 Pages

    However, there is growing interest in protocols and other mechanisms for use with novel telecommunications services. Next-generation value-added services are bound to introduce new vulnerabilities. The interaction between all these communications and security protocols, and the mechanisms used for distributed systems security, is fertile ground for both interesting research. Ways to enhance these protection tools to make sure our technology is safe from IT attacks are evolving all the time. The systems or measures used to protect a company system at present might not be of any use in the future as technology is always enhancing to higher levels. Telecommunication businesses tend to be comparatively adept at managing information security risks. And many are taking action to achieve an enhanced level of ongoing insight and intelligence into ecosystem vulnerabilities and dynamic threats. Companies like Celcom must be ready to invest in this expensive research so as to be able to aggressively compete in the intense telecommunication market and to be able to sustain itself in this industry. Today, information security is a discipline that demands advanced technologies and processes, a skill set based on counterintelligence techniques, and the unwavering support of top executives. As telecom operators become more similar to technology companies, they will face a raft of new challenges. Core practices like employee awareness and training, policies and tools to reduce insider risks, and protection of data, including intellectual property, will need to be updated. The confluence of mobility, cloud, and social networking have multiplied risks, yet few operators have addressed these threats or deployed technologies that monitor user and network activity to provide insight into ecosystem vulnerabilities and threats. These…

    • 4104 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    The Infrastructure deployment scenario will allow for wireless access points (WAPs) to be connected to the existing wired network allowing employees with wireless devices the ability to access the company’s network. This is a commonly used method of enhancing an existing wired network while adding the benefit of mobility to employees and is a cost-effective way to upgrade to a wireless local area network (WLAN). On-the-go employees can potentially improve job productivity while in the Conference Center by having the ability to wirelessly access company printers, file servers, and Internet and/or Intranet without the need to plug into the company network.…

    • 2305 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Mobile use has become increasingly popular because of the advances in phone, tablet and laptop technology. Kudler Fine Foods must embrace this new technology not only to use it to further their business goals but to also address the security concerns that it poses. Allowing mobile use on the organizational network would mean using wireless connectivity, this opens up the network to a number of threats such as:…

    • 1352 Words
    • 6 Pages
    Better Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Better Essays

    There are many threats a network faces when the IT department allows students to connect to the network or Internet using mobile devices. Some threats affect the campus network only, while other threats directly affect students or employees. For the campus network, threats include…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    The IT department along other members of the governance committee will need to meet to develop standard protocols, policies and guidelines that clearly communicate the BYOD expectations. Employees need to fully understand that the use of an MDM platform allows FRH to access their device…

    • 433 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Effective BYOD Policy

    • 204 Words
    • 1 Page

    Identify which devices are permitted: What works for one organization might not work for others. If at an organization, the employees are provided company Blackberry device and computers for work, it is advised when considering a BYOD it can’t be expected that everyone will have a personal blackberry cell phone. It is feasible when other cell phones like Apple and Android are allowed. There should be specific policies identified for different OS. Since there are so many phone choices in the market.…

    • 204 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Students, especially college students, are consistently on some type of social media site or on a mobile device that gains them that type of access. There are many varieties of devices such as tablets, smartphones, laptops, and now even smartwatches. Devices such as these are connecting to wireless networks whether it’s from a service provider or campus. With these connections many aren’t just using them for social media, but also for checking grades, schedules, or relevant news. The devices depend on connecting to networks but also need to do so in a secure fashion. Each device has to be checked for viruses, spyware, and other types of malware while still maintaining the C-I-A triad. A balance must be found between usability and security. Each time a remote device is connected to the network there is a possibility that the network can be compromised by one these devices. Every device should be authenticated, scanned, and identified. Many are unaware of the risks that can come from connecting to networks, especially wireless access.…

    • 650 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Businesses are increasingly using mobile employees with mobile devices that connect to the company’s infrastructure wirelessly. When business employees are out and about they have many different options for connecting. They can use their smartphones, create a hotspot with their smartphone to connect other devices to the network or use public Wi-Fi…

    • 3826 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Level 3 Business

    • 1150 Words
    • 5 Pages

    * Use of related mobile technology by business organisations: WiFi; Bluetooth®; 3G phones; PDAs; smartphones; Voice Over internet Protocol (VoIP)…

    • 1150 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Background and Business Driver: Bring-Your-Own-Device (BYOD) policy iss quite well known to all as this allows employees to bring in personalized devices like smart phones, tablet, even laptops to their workplace to access secure company information and applications. BYOD was successful as it resulted many advantages like increase in productivity, increased…

    • 1273 Words
    • 6 Pages
    Powerful Essays