Bring your Own Device
Name:
Tutor:
Course:
Date:
Bring your Own Device
Introduction
Information Technology consumerization has enabled a policy where companies can allow their workers use their own devices at the workplace in order to access privileged information, applications and resources of the organization. The significant inroads made by the discoveries of Bring Your Own Device have had tremendous impact towards productivity, comfort, and generated innovation at the workplaces. However, concerns have been raised with the risk issues associated with the policy in equal measure. Information Technology analysts cannot ignore the benefits realized with the policy as the growth markets of the technology are on the continuous increase across the world. Bring Your Own Device policy should be eliminated within organizations in order to ensure maximum safety.
Discussion
User policies are a major concern within organizations especially where shred information can be obtained with relative ease. The risk factors are heightened when the type of information available is of a highly sensitive nature and relates to the end node problem. When BYOD policies make it easier to access and overwrite the end node identity, the company’s information becomes available to anyone, thereby leading to vulnerability (Hayes and Kotwica 17). It I easier to attack the organization, misappropriate the information available or spread malicious intent into the shared network without being compromised on the source. The results are potential losses to the resources and increased danger from external targeting through the shard network.
The cost of ensuring BYOD policies are available within the framework structures of organizations is usually high. One of the fundamental procedures deliberated before the availability of the resources on the network is enabled through issuer compliance. In this case, the policy is determined as a means of entrusting the users on the analyzed basis of confidentiality and pegging on the organization’s liability. It is then followed by numerous efforts in ensuring that the security systems are always updated and preventive from any form of attacks or illegal ownership. Garba, Armagero, Murray, and Kenworthy (42) note that with the robust nature of network availabilities and technological advancements, the policy increases the sophistication levels each day. Therefore, it maintenance becomes an added cost to the management.
End-user support and cross-platform services in networks determine the relative ease of using shared resources, communication, and management. The support mechanisms available for networks are determined by the individual hot retention on interfaces within the networks as well as ensuring cross-platform mechanism are smooth. However, with the different availabilities in the present world, uniformity is never possible within networking, especially with large organizations (Olalere, Abdullah, Mahmod, and Abdullah 14). BYOD is therefore responsible for troubleshooting of host complexities at the network resources, leading to the focus on its management rather than its utilities for compliance and reliability. It is strengthened with decreased value in user interfaces and trust issues. Changes have to be in effect on constant basis, placing the strain on network management and required assurances.
Conclusion
Bring Your Own
Device policy should be eliminated within organizations in order to ensure
maximum safety. The policy allows workers in organizations use their own
devices at the workplace in order to access privileged information, applications,
and resources of the company. The benefits realized include technology budget
of the hardware costs, familiarity, digital literacy, and improved output and
productivity levels with comfort. However, numerous disadvantages with the
policy become a burden with the organization through End-user support and
cross-platform services, increased costs, security risks, high requirements for
user policies and reliance issues.
Works Cited:
Garba, Abubakar, Jocelyn Armagero, David Murray, and William Kenworthy. “Review of the Information Security and Privacy Challenges in Bring Your Own Device (BYOD) Environments.” Journal of Information Privacy and Security 11 (2015): 38-54. Print.
Hayes, Bob E, and Kathleen Kotwica. Bring Your Own Device (byod) to Work: Trend Report. Oxford: Elsevier, 2013. Print.
Olalere, Morufu, Mohd Abdullah, Amlan Mahmod, Azizol Abdullah. “A Review of Bring Your own Device on Security Systems” SAGE Journals 10 (2015): 11-24.
Top-quality papers guaranteed
100% original papers
We sell only unique pieces of writing completed according to your demands.
Confidential service
We use security encryption to keep your personal data protected.
Money-back guarantee
We can give your money back if something goes wrong with your order.
Enjoy the free features we offer to everyone
-
Title page
Get a free title page formatted according to the specifics of your particular style.
-
Custom formatting
Request us to use APA, MLA, Harvard, Chicago, or any other style for your essay.
-
Bibliography page
Don’t pay extra for a list of references that perfectly fits your academic needs.
-
24/7 support assistance
Ask us a question anytime you need to—we don’t charge extra for supporting you!
Calculate how much your essay costs
What we are popular for
- English 101
- History
- Business Studies
- Management
- Literature
- Composition
- Psychology
- Philosophy
- Marketing
- Economics