SlideShare a Scribd company logo
1 of 1
Download to read offline
CASE STUDY: There is a new phenomenon in the cybersecurity domain called: "Bring Your
Own Device (BYOD)" where employees can bring their personal devices at work and connect
using the Wi-Fi to the organization's network. Many employers are allowing their employees to
use their personal mobile device for enterprise functions such as corporate email, work
applications, etc. While this may save the company costs, the organization's network remains
vulnerable. A company can only monitor so much that's on an employee personal device; Assess
the threats, the vulnerabilities, and the impacts on an organization's information systems posed
by the use of mobile devices at work. What can be done to fix it at the policy level, technology
level, and infrastructure level? Additional information: A threat is an undesirable events that can
cause harm. A vulnerability is a weakness in an organization's systems or security policies that
can be exploited to cause damage. Impacts are the severity of the consequences if a threat indeed
causes damage by exploiting a vulnerability. An information systems are combinations of
hardware, software, telecommunications network, data, and people.

More Related Content

Similar to CASE STUDY There is a new phenomenon in the cybersecurity domain cal.pdf

BYOD Security
BYOD SecurityBYOD Security
BYOD SecurityHexnode
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and ThreatsIRJET Journal
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
3 data leak possibilities that are easy to overlook
3 data leak possibilities that are easy to overlook3 data leak possibilities that are easy to overlook
3 data leak possibilities that are easy to overlookPeter Hewer
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurityGary Sandoval
 
Importance of cyber security in education sector
Importance of cyber security in education sectorImportance of cyber security in education sector
Importance of cyber security in education sectorSeqrite
 
Most Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesMost Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesBryTech INC
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligencewbesse
 
Information Security
Information SecurityInformation Security
Information Securitysteffiann88
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device J
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprisesTaranggg11
 

Similar to CASE STUDY There is a new phenomenon in the cybersecurity domain cal.pdf (20)

BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
3 data leak possibilities that are easy to overlook
3 data leak possibilities that are easy to overlook3 data leak possibilities that are easy to overlook
3 data leak possibilities that are easy to overlook
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
 
Importance of cyber security in education sector
Importance of cyber security in education sectorImportance of cyber security in education sector
Importance of cyber security in education sector
 
Most Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesMost Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling Enterprises
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
 
Information Security
Information SecurityInformation Security
Information Security
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 

More from sattarali527

CAM plants cope with hot, dry environments by Separating CO2 intake f.pdf
 CAM plants cope with hot, dry environments by Separating CO2 intake f.pdf CAM plants cope with hot, dry environments by Separating CO2 intake f.pdf
CAM plants cope with hot, dry environments by Separating CO2 intake f.pdfsattarali527
 
Consider a humid temperate region such as western Oregon and Washingt.pdf
 Consider a humid temperate region such as western Oregon and Washingt.pdf Consider a humid temperate region such as western Oregon and Washingt.pdf
Consider a humid temperate region such as western Oregon and Washingt.pdfsattarali527
 
Consider a cubic polynomial regression of Y on X (with no other varia.pdf
 Consider a cubic polynomial regression of Y on X (with no other varia.pdf Consider a cubic polynomial regression of Y on X (with no other varia.pdf
Consider a cubic polynomial regression of Y on X (with no other varia.pdfsattarali527
 
conpelline wor. Peave eloberate the yatenent, identity the diferent .pdf
 conpelline wor. Peave eloberate the yatenent, identity the diferent .pdf conpelline wor. Peave eloberate the yatenent, identity the diferent .pdf
conpelline wor. Peave eloberate the yatenent, identity the diferent .pdfsattarali527
 
concerning the companys operations in July appear below The company.pdf
 concerning the companys operations in July appear below The company.pdf concerning the companys operations in July appear below The company.pdf
concerning the companys operations in July appear below The company.pdfsattarali527
 
Calculate the gross income.At any time during 2019, did you receiv.pdf
 Calculate the gross income.At any time during 2019, did you receiv.pdf Calculate the gross income.At any time during 2019, did you receiv.pdf
Calculate the gross income.At any time during 2019, did you receiv.pdfsattarali527
 
Computer information systems - Tell us about your knowledge of a Coll.pdf
 Computer information systems - Tell us about your knowledge of a Coll.pdf Computer information systems - Tell us about your knowledge of a Coll.pdf
Computer information systems - Tell us about your knowledge of a Coll.pdfsattarali527
 
Computer Model Specs For drawing the component layout diagram. Skyte.pdf
 Computer Model Specs For drawing the component layout diagram. Skyte.pdf Computer Model Specs For drawing the component layout diagram. Skyte.pdf
Computer Model Specs For drawing the component layout diagram. Skyte.pdfsattarali527
 
COMPUTE FOR YOUR BASIC EARNING PER SHARE BASIC EARNINGS PER SHARE E.pdf
 COMPUTE FOR YOUR BASIC EARNING PER SHARE  BASIC EARNINGS PER SHARE E.pdf COMPUTE FOR YOUR BASIC EARNING PER SHARE  BASIC EARNINGS PER SHARE E.pdf
COMPUTE FOR YOUR BASIC EARNING PER SHARE BASIC EARNINGS PER SHARE E.pdfsattarali527
 
Compuse the cash paybock periad for DO ITt 12.1 (LO 1), AP Wayne Com.pdf
 Compuse the cash paybock periad for  DO ITt 12.1 (LO 1), AP Wayne Com.pdf Compuse the cash paybock periad for  DO ITt 12.1 (LO 1), AP Wayne Com.pdf
Compuse the cash paybock periad for DO ITt 12.1 (LO 1), AP Wayne Com.pdfsattarali527
 
Complete the MainActivity kt and MyAdapter kt code given below. Use t.pdf
 Complete the MainActivity kt and MyAdapter kt code given below. Use t.pdf Complete the MainActivity kt and MyAdapter kt code given below. Use t.pdf
Complete the MainActivity kt and MyAdapter kt code given below. Use t.pdfsattarali527
 
Complete the following probability distribution table and then calcul.pdf
 Complete the following probability distribution table and then calcul.pdf Complete the following probability distribution table and then calcul.pdf
Complete the following probability distribution table and then calcul.pdfsattarali527
 
Complete la tabla marcando () la columna correcta para cada afirma.pdf
 Complete la tabla marcando () la columna correcta para cada afirma.pdf Complete la tabla marcando () la columna correcta para cada afirma.pdf
Complete la tabla marcando () la columna correcta para cada afirma.pdfsattarali527
 
Compare and contrast the changing roles of gametophytes and sporophyt.pdf
 Compare and contrast the changing roles of gametophytes and sporophyt.pdf Compare and contrast the changing roles of gametophytes and sporophyt.pdf
Compare and contrast the changing roles of gametophytes and sporophyt.pdfsattarali527
 
Choose the climate forcings or feedbacks that cause climate anomalies.pdf
 Choose the climate forcings or feedbacks that cause climate anomalies.pdf Choose the climate forcings or feedbacks that cause climate anomalies.pdf
Choose the climate forcings or feedbacks that cause climate anomalies.pdfsattarali527
 
Comparative balance sheets for Softech Canvas Goods for 2021 and 2020.pdf
 Comparative balance sheets for Softech Canvas Goods for 2021 and 2020.pdf Comparative balance sheets for Softech Canvas Goods for 2021 and 2020.pdf
Comparative balance sheets for Softech Canvas Goods for 2021 and 2020.pdfsattarali527
 
Chose the answer that best describes the DNA genome replication mecha.pdf
 Chose the answer that best describes the DNA genome replication mecha.pdf Chose the answer that best describes the DNA genome replication mecha.pdf
Chose the answer that best describes the DNA genome replication mecha.pdfsattarali527
 
Choose ALL the statements which are FALSE about DNA replication. a. O.pdf
 Choose ALL the statements which are FALSE about DNA replication. a. O.pdf Choose ALL the statements which are FALSE about DNA replication. a. O.pdf
Choose ALL the statements which are FALSE about DNA replication. a. O.pdfsattarali527
 
Claim Fewer than 94 of adults have a cell phone. In a reputable pol.pdf
 Claim Fewer than 94 of adults have a cell phone. In a reputable pol.pdf Claim Fewer than 94 of adults have a cell phone. In a reputable pol.pdf
Claim Fewer than 94 of adults have a cell phone. In a reputable pol.pdfsattarali527
 
Cick the icon to vew ino dsta the a) Find a 954 confidence interval f.pdf
 Cick the icon to vew ino dsta the a) Find a 954 confidence interval f.pdf Cick the icon to vew ino dsta the a) Find a 954 confidence interval f.pdf
Cick the icon to vew ino dsta the a) Find a 954 confidence interval f.pdfsattarali527
 

More from sattarali527 (20)

CAM plants cope with hot, dry environments by Separating CO2 intake f.pdf
 CAM plants cope with hot, dry environments by Separating CO2 intake f.pdf CAM plants cope with hot, dry environments by Separating CO2 intake f.pdf
CAM plants cope with hot, dry environments by Separating CO2 intake f.pdf
 
Consider a humid temperate region such as western Oregon and Washingt.pdf
 Consider a humid temperate region such as western Oregon and Washingt.pdf Consider a humid temperate region such as western Oregon and Washingt.pdf
Consider a humid temperate region such as western Oregon and Washingt.pdf
 
Consider a cubic polynomial regression of Y on X (with no other varia.pdf
 Consider a cubic polynomial regression of Y on X (with no other varia.pdf Consider a cubic polynomial regression of Y on X (with no other varia.pdf
Consider a cubic polynomial regression of Y on X (with no other varia.pdf
 
conpelline wor. Peave eloberate the yatenent, identity the diferent .pdf
 conpelline wor. Peave eloberate the yatenent, identity the diferent .pdf conpelline wor. Peave eloberate the yatenent, identity the diferent .pdf
conpelline wor. Peave eloberate the yatenent, identity the diferent .pdf
 
concerning the companys operations in July appear below The company.pdf
 concerning the companys operations in July appear below The company.pdf concerning the companys operations in July appear below The company.pdf
concerning the companys operations in July appear below The company.pdf
 
Calculate the gross income.At any time during 2019, did you receiv.pdf
 Calculate the gross income.At any time during 2019, did you receiv.pdf Calculate the gross income.At any time during 2019, did you receiv.pdf
Calculate the gross income.At any time during 2019, did you receiv.pdf
 
Computer information systems - Tell us about your knowledge of a Coll.pdf
 Computer information systems - Tell us about your knowledge of a Coll.pdf Computer information systems - Tell us about your knowledge of a Coll.pdf
Computer information systems - Tell us about your knowledge of a Coll.pdf
 
Computer Model Specs For drawing the component layout diagram. Skyte.pdf
 Computer Model Specs For drawing the component layout diagram. Skyte.pdf Computer Model Specs For drawing the component layout diagram. Skyte.pdf
Computer Model Specs For drawing the component layout diagram. Skyte.pdf
 
COMPUTE FOR YOUR BASIC EARNING PER SHARE BASIC EARNINGS PER SHARE E.pdf
 COMPUTE FOR YOUR BASIC EARNING PER SHARE  BASIC EARNINGS PER SHARE E.pdf COMPUTE FOR YOUR BASIC EARNING PER SHARE  BASIC EARNINGS PER SHARE E.pdf
COMPUTE FOR YOUR BASIC EARNING PER SHARE BASIC EARNINGS PER SHARE E.pdf
 
Compuse the cash paybock periad for DO ITt 12.1 (LO 1), AP Wayne Com.pdf
 Compuse the cash paybock periad for  DO ITt 12.1 (LO 1), AP Wayne Com.pdf Compuse the cash paybock periad for  DO ITt 12.1 (LO 1), AP Wayne Com.pdf
Compuse the cash paybock periad for DO ITt 12.1 (LO 1), AP Wayne Com.pdf
 
Complete the MainActivity kt and MyAdapter kt code given below. Use t.pdf
 Complete the MainActivity kt and MyAdapter kt code given below. Use t.pdf Complete the MainActivity kt and MyAdapter kt code given below. Use t.pdf
Complete the MainActivity kt and MyAdapter kt code given below. Use t.pdf
 
Complete the following probability distribution table and then calcul.pdf
 Complete the following probability distribution table and then calcul.pdf Complete the following probability distribution table and then calcul.pdf
Complete the following probability distribution table and then calcul.pdf
 
Complete la tabla marcando () la columna correcta para cada afirma.pdf
 Complete la tabla marcando () la columna correcta para cada afirma.pdf Complete la tabla marcando () la columna correcta para cada afirma.pdf
Complete la tabla marcando () la columna correcta para cada afirma.pdf
 
Compare and contrast the changing roles of gametophytes and sporophyt.pdf
 Compare and contrast the changing roles of gametophytes and sporophyt.pdf Compare and contrast the changing roles of gametophytes and sporophyt.pdf
Compare and contrast the changing roles of gametophytes and sporophyt.pdf
 
Choose the climate forcings or feedbacks that cause climate anomalies.pdf
 Choose the climate forcings or feedbacks that cause climate anomalies.pdf Choose the climate forcings or feedbacks that cause climate anomalies.pdf
Choose the climate forcings or feedbacks that cause climate anomalies.pdf
 
Comparative balance sheets for Softech Canvas Goods for 2021 and 2020.pdf
 Comparative balance sheets for Softech Canvas Goods for 2021 and 2020.pdf Comparative balance sheets for Softech Canvas Goods for 2021 and 2020.pdf
Comparative balance sheets for Softech Canvas Goods for 2021 and 2020.pdf
 
Chose the answer that best describes the DNA genome replication mecha.pdf
 Chose the answer that best describes the DNA genome replication mecha.pdf Chose the answer that best describes the DNA genome replication mecha.pdf
Chose the answer that best describes the DNA genome replication mecha.pdf
 
Choose ALL the statements which are FALSE about DNA replication. a. O.pdf
 Choose ALL the statements which are FALSE about DNA replication. a. O.pdf Choose ALL the statements which are FALSE about DNA replication. a. O.pdf
Choose ALL the statements which are FALSE about DNA replication. a. O.pdf
 
Claim Fewer than 94 of adults have a cell phone. In a reputable pol.pdf
 Claim Fewer than 94 of adults have a cell phone. In a reputable pol.pdf Claim Fewer than 94 of adults have a cell phone. In a reputable pol.pdf
Claim Fewer than 94 of adults have a cell phone. In a reputable pol.pdf
 
Cick the icon to vew ino dsta the a) Find a 954 confidence interval f.pdf
 Cick the icon to vew ino dsta the a) Find a 954 confidence interval f.pdf Cick the icon to vew ino dsta the a) Find a 954 confidence interval f.pdf
Cick the icon to vew ino dsta the a) Find a 954 confidence interval f.pdf
 

Recently uploaded

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Recently uploaded (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 

CASE STUDY There is a new phenomenon in the cybersecurity domain cal.pdf

  • 1. CASE STUDY: There is a new phenomenon in the cybersecurity domain called: "Bring Your Own Device (BYOD)" where employees can bring their personal devices at work and connect using the Wi-Fi to the organization's network. Many employers are allowing their employees to use their personal mobile device for enterprise functions such as corporate email, work applications, etc. While this may save the company costs, the organization's network remains vulnerable. A company can only monitor so much that's on an employee personal device; Assess the threats, the vulnerabilities, and the impacts on an organization's information systems posed by the use of mobile devices at work. What can be done to fix it at the policy level, technology level, and infrastructure level? Additional information: A threat is an undesirable events that can cause harm. A vulnerability is a weakness in an organization's systems or security policies that can be exploited to cause damage. Impacts are the severity of the consequences if a threat indeed causes damage by exploiting a vulnerability. An information systems are combinations of hardware, software, telecommunications network, data, and people.