CASE STUDY: There is a new phenomenon in the cybersecurity domain called: "Bring Your Own Device (BYOD)" where employees can bring their personal devices at work and connect using the Wi-Fi to the organization's network. Many employers are allowing their employees to use their personal mobile device for enterprise functions such as corporate email, work applications, etc. While this may save the company costs, the organization's network remains vulnerable. A company can only monitor so much that's on an employee personal device; Assess the threats, the vulnerabilities, and the impacts on an organization's information systems posed by the use of mobile devices at work. What can be done to fix it at the policy level, technology level, and infrastructure level? Additional information: A threat is an undesirable events that can cause harm. A vulnerability is a weakness in an organization's systems or security policies that can be exploited to cause damage. Impacts are the severity of the consequences if a threat indeed causes damage by exploiting a vulnerability. An information systems are combinations of hardware, software, telecommunications network, data, and people..