New User Special Price Expires in

Let's log you in.

Sign in with Facebook


Don't have a StudySoup account? Create one here!


Create a StudySoup account

Be part of our community, it's free to join!

Sign up with Facebook


Create your account
By creating an account you agree to StudySoup's terms and conditions and privacy policy

Already have a StudySoup account? Login here

Week 9 - Case Study 2 - Federal CIO Councils Bring Your Own Device

by: Topseller Notetaker

Week 9 - Case Study 2 - Federal CIO Councils Bring Your Own Device PRG211

Marketplace > Ashford University > Computer Programming > PRG211 > Week 9 Case Study 2 Federal CIO Councils Bring Your Own Device
Topseller Notetaker
GPA 3.9

Preview These Notes for FREE

Get a free preview of these Notes, just enter your email below.

Unlock Preview
Unlock Preview

Preview these materials now for free

Why put in your email? Get access to more of this material and other relevant free materials for your school

View Preview

About this Document

Week 9 - Case Study 2 - Federal CIO Councils Bring Your Own Device
Study Guide
50 ?




Popular in

Popular in Computer Programming

This 6 page Study Guide was uploaded by Topseller Notetaker on Monday November 9, 2015. The Study Guide belongs to PRG211 at Ashford University taught by in Fall 2015. Since its upload, it has received 34 views. For similar materials see in Computer Programming at Ashford University.

Similar to PRG211 at AU

Popular in Computer Programming


Reviews for Week 9 - Case Study 2 - Federal CIO Councils Bring Your Own Device


Report this Material


What is Karma?


Karma is the currency of StudySoup.

You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!

Date Created: 11/09/15
Running Header: Federal CIO Council’s Bring Your Own Device (BYOD) Toolkit                    1 Federal CIO Council’s Bring Your Own Device (BYOD) Toolkit                     Kimberly D. White CIS 336 Enterprise Architecture Professor McCoy February 10, 2014 Running Header: Federal CIO Council’s Bring Your Own Device (BYOD) Toolkit                    2 Federal CIO Council’s Bring Your Own Device (BYOD) Toolkit              Bring Your Own Device (BYOD) is the scenario when employees bring their own  devices to work and connect to enterprise systems.  This commonly used to mean devices such  as smart phones, tablets and laptops (Pearlson and Saunders, pg. 377). In the Alcohol and Tobacco Tax and trade Bureau (TTB) they examined their existing  hardware, software and technical expertise.  They determined that 80% of the Windows Server  and 20% of the Sun Solaris servers had already been virtualized.  From obtaining this  information, TTB came to the conclusion that a virtual desktop infrastructure could be built  without purchasing more servers.  TTB was already somewhat prepared because they already  have significant number of people already working full­time from home, and they were already  supporting these workers with a robust remote access capability. In the U. S. Equal Employment Opportunity Commission (EEOC), they got their wireless carrier to agree to the bundled rate plan with shared minutes.  With them agreeing EEOC was  able to reduce their cost by roughly $240,000.00 and then they offered the BYOD.  By 2012  many of the BlackBerry users “opted out” and joined the BYOD plan.  EEOC used a cloud  provider and was able to use and existing on premise BES system for additional support. In the State of Delaware BYOD Program, they started a 2 year transition plan to migrate  the users from the existing infrastructure to the BYOD or to a device that ran directly through the state’s wireless carrier.  The state decided to make it completely voluntary at the time, because  the state recognized that not all employees had a personal device.  By implementing BYOD it  Running Header: Federal CIO Council’s Bring Your Own Device (BYOD) Toolkit                    3 reduced the state’s wireless cost by 15%.  The state has also decided to limit the number of state  owned devices, to help encourage the use of more personal devices. When it comes to IT Support requirements for employee devices, there are a few  requirements that are needed.  To mention a few, it must be password protected.  The device has  to have a secured password that passes the companies requirements.  The user must not change  the original operating system on the device.  It must keep the original factory operating system.   The device cannot be shared with other users.  You must be the only one accessing the device.   Do not share or save any sensitive business files on the device.  Do not download or transfer any  sensitive business data from the device.  Only use the BYOD’s that provides FIPS 140­2 device  level encryption, and maintains a current Anti­virus.  These are just a few requirements that must be followed to participate in the BYOD program. A holistic and methodical approach should be used to define the security risk and help to  ensure that controls exist to maintain the security of the device in the company.  Potential  security risks of BYOD can be broken down into 3 areas:  Securing mobile devices  Addressing app risk  Managing the mobile environment Securing mobile devices can be a task.  End users often have more than one device and  would like to connect multiple devices to the company’s infrastructure, which increases the net  number of devices that must be secured.  As a result, the security controls may not be as  consistent and effective across the collection of devices.  Also, securing mobile devices creates  Running Header: Federal CIO Council’s Bring Your Own Device (BYOD) Toolkit                    4 other major concerns such as lost or stolen devices, physical access, the role of end user device  ownership, always on with increased data access, and lack of awareness. Apps demonstrate utility that is seemingly bound on by the developer’s imagination, but  it also increases the risk of supporting BYOD devices in a business environment.  The potential  security risks with apps are malicious apps (malware) and app vulnerabilities. Managing the mobile environment with BYOD increases the business’s management  effort.  Maintaining accurate inventory, mobile operating system’s software up to date, and  supporting the increase number of device types become even harder to keep up with.  BYOD  increases the inventory and platform management risks in business environment. BYOD can be a very helpful program to implement, but it takes a lot of hard work to  keep it maintained.  BYOD can help the company save money and many companies don’t want  to spend the money to get the program implemented.  BYOD seems to be the popular way to go  since almost every working person has a smart phone, tablet, or laptop.  BYOD is on the rise. Running Header: Federal CIO Council’s Bring Your Own Device (BYOD) Toolkit                    5 References Pearlson, K. & Saunders, C., (2013) Managing & Using Information Systems 5th Edition, Jon  Wiley & Sons, Inc. ISBN: 978­1­1182­8173­4 Bring Your Own Device, September 2013, Posted by: EYGM Limited Security Policies Must Address Legal Implications of BYOD, March 2013, Posted by: Michael  Kassner Bring Your Own Devices|The White House, August 2012, Posted by: Digital Services Advisory  Group and Federal Chief Information Officers Council­your­own­device. Running Header: Federal CIO Council’s Bring Your Own Device (BYOD) Toolkit                    6


Buy Material

Are you sure you want to buy this material for

50 Karma

Buy Material

BOOM! Enjoy Your Free Notes!

We've added these Notes to your profile, click here to view them now.


You're already Subscribed!

Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'

Why people love StudySoup

Jim McGreen Ohio University

"Knowing I can count on the Elite Notetaker in my class allows me to focus on what the professor is saying instead of just scribbling notes the whole time and falling behind."

Kyle Maynard Purdue

"When you're taking detailed notes and trying to help everyone else out in the class, it really helps you learn and understand the I made $280 on my first study guide!"

Steve Martinelli UC Los Angeles

"There's no way I would have passed my Organic Chemistry class this semester without the notes and study guides I got from StudySoup."


"Their 'Elite Notetakers' are making over $1,200/month in sales by creating high quality content that helps their classmates in a time of need."

Become an Elite Notetaker and start selling your notes online!

Refund Policy


All subscriptions to StudySoup are paid in full at the time of subscribing. To change your credit card information or to cancel your subscription, go to "Edit Settings". All credit card information will be available there. If you should decide to cancel your subscription, it will continue to be valid until the next payment period, as all payments for the current period were made in advance. For special circumstances, please email


StudySoup has more than 1 million course-specific study resources to help students study smarter. If you’re having trouble finding what you’re looking for, our customer support team can help you find what you need! Feel free to contact them here:

Recurring Subscriptions: If you have canceled your recurring subscription on the day of renewal and have not downloaded any documents, you may request a refund by submitting an email to

Satisfaction Guarantee: If you’re not satisfied with your subscription, you can contact us for further help. Contact must be made within 3 business days of your subscription purchase and your refund request will be subject for review.

Please Note: Refunds can never be provided more than 30 days after the initial purchase date regardless of your activity on the site.