Topic > Bring Your Own Device Model Review

BYOD is trendy, convenient, and employee-friendly. Intel, on the other hand, is the largest chip manufacturer in the world, a pioneer in the technology sector. Adopting the BYOD model is a great move for Intel, as employees are satisfied and more responsible towards their devices. This will also improve employee productivity. Like any other model, BYOD came with its own set of risks. As mentioned in many of our information security courses, no matter how strong the security is, it is never 100%. Not only did it present technical challenges, but security and privacy were also major risks of BYOD. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essay One of Harkins' main concerns is data security. As suggested in the case, Intel Corp.-Bring Your Own Devices (p.1) employees bring their own devices and use them during office hours, which is why the distinction between corporate data and private data was becoming confused. Furthermore, the use of personal devices can also lead to a loss of productivity among employees, as mentioned in the Intel Corp.-Bring Your Own Device case (p.2). Another vulnerability in corporate data security is the use of unprotected public data. networks. An employee is very likely to connect their personal devices to public networks such as in a coffee shop and/or hotel. As tempting as these networks are for users, they also attract the attention of hackers, as it is easy to break into these networks with a little software and gain access to any shared information. As reported in the IPsec VPN Guide article (page .2-4), in order to avoid security risks to company data, Intel should configure the VPN with symmetric encryption to encrypt company data. Keeping note of the vulnerabilities in each encryption method, using the WPA2 method for encryption would be the best solution. Six keys to improving wireless security (p. 394). This will help mitigate the risk of corporate data being inadvertently shared from personal devices. As mentioned in Intel Corp.-Bring Your Own Device (p.2), Harkins saw a certain law that said, "Information wants to be free." This compromises security and CIOs cannot enforce their own rules. We recommend that Harkins add some authentication methods when connecting to the corporate network. As mentioned in the article Digital identity guidelines: authentication and lifecycle management (page 13), when connecting to the company network, the user must provide a stored secret verifier. This way, an unknown device/user trying to connect to the corporate network fails. Accessing data on an employee's personal device can be difficult, as it can lead to violation of the employee's privacy. And the growing use of smartphones in the corporate network will lead to security breaches and greater risks. According to the article Six Keys to Improve Your Wireless Connection (Key 2: Require Strong Authentication p. 3), Intel can use strong multi-factor authentication to authorize user access to sensitive data. Additionally, applying the COBIT DSS05.03 Manage endpoint security security protocol will secure the network and protect the integrity of the system. Changes to FRCP rules and the recent lawsuit mentioned in the article Intel Corp - Bring Your Own Device (p.10) raise an alarm to set controls on the storage of data such as emails and instant messages of all COBIT DSS06 employees. 05. These.