Week 9 - Case Study 2 - Federal CIO Councils Bring Your Own Device
Week 9 - Case Study 2 - Federal CIO Councils Bring Your Own Device PRG211
Popular in Computer Programming
This 6 page Study Guide was uploaded by Topseller Notetaker on Monday November 9, 2015. The Study Guide belongs to PRG211 at Ashford University taught by in Fall 2015. Since its upload, it has received 34 views. For similar materials see in Computer Programming at Ashford University.
Reviews for Week 9 - Case Study 2 - Federal CIO Councils Bring Your Own Device
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 11/09/15
Running Header: Federal CIO Council’s Bring Your Own Device (BYOD) Toolkit 1 Federal CIO Council’s Bring Your Own Device (BYOD) Toolkit Kimberly D. White CIS 336 Enterprise Architecture Professor McCoy February 10, 2014 Running Header: Federal CIO Council’s Bring Your Own Device (BYOD) Toolkit 2 Federal CIO Council’s Bring Your Own Device (BYOD) Toolkit Bring Your Own Device (BYOD) is the scenario when employees bring their own devices to work and connect to enterprise systems. This commonly used to mean devices such as smart phones, tablets and laptops (Pearlson and Saunders, pg. 377). In the Alcohol and Tobacco Tax and trade Bureau (TTB) they examined their existing hardware, software and technical expertise. They determined that 80% of the Windows Server and 20% of the Sun Solaris servers had already been virtualized. From obtaining this information, TTB came to the conclusion that a virtual desktop infrastructure could be built without purchasing more servers. TTB was already somewhat prepared because they already have significant number of people already working fulltime from home, and they were already supporting these workers with a robust remote access capability. In the U. S. Equal Employment Opportunity Commission (EEOC), they got their wireless carrier to agree to the bundled rate plan with shared minutes. With them agreeing EEOC was able to reduce their cost by roughly $240,000.00 and then they offered the BYOD. By 2012 many of the BlackBerry users “opted out” and joined the BYOD plan. EEOC used a cloud provider and was able to use and existing on premise BES system for additional support. In the State of Delaware BYOD Program, they started a 2 year transition plan to migrate the users from the existing infrastructure to the BYOD or to a device that ran directly through the state’s wireless carrier. The state decided to make it completely voluntary at the time, because the state recognized that not all employees had a personal device. By implementing BYOD it Running Header: Federal CIO Council’s Bring Your Own Device (BYOD) Toolkit 3 reduced the state’s wireless cost by 15%. The state has also decided to limit the number of state owned devices, to help encourage the use of more personal devices. When it comes to IT Support requirements for employee devices, there are a few requirements that are needed. To mention a few, it must be password protected. The device has to have a secured password that passes the companies requirements. The user must not change the original operating system on the device. It must keep the original factory operating system. The device cannot be shared with other users. You must be the only one accessing the device. Do not share or save any sensitive business files on the device. Do not download or transfer any sensitive business data from the device. Only use the BYOD’s that provides FIPS 1402 device level encryption, and maintains a current Antivirus. These are just a few requirements that must be followed to participate in the BYOD program. A holistic and methodical approach should be used to define the security risk and help to ensure that controls exist to maintain the security of the device in the company. Potential security risks of BYOD can be broken down into 3 areas: Securing mobile devices Addressing app risk Managing the mobile environment Securing mobile devices can be a task. End users often have more than one device and would like to connect multiple devices to the company’s infrastructure, which increases the net number of devices that must be secured. As a result, the security controls may not be as consistent and effective across the collection of devices. Also, securing mobile devices creates Running Header: Federal CIO Council’s Bring Your Own Device (BYOD) Toolkit 4 other major concerns such as lost or stolen devices, physical access, the role of end user device ownership, always on with increased data access, and lack of awareness. Apps demonstrate utility that is seemingly bound on by the developer’s imagination, but it also increases the risk of supporting BYOD devices in a business environment. The potential security risks with apps are malicious apps (malware) and app vulnerabilities. Managing the mobile environment with BYOD increases the business’s management effort. Maintaining accurate inventory, mobile operating system’s software up to date, and supporting the increase number of device types become even harder to keep up with. BYOD increases the inventory and platform management risks in business environment. BYOD can be a very helpful program to implement, but it takes a lot of hard work to keep it maintained. BYOD can help the company save money and many companies don’t want to spend the money to get the program implemented. BYOD seems to be the popular way to go since almost every working person has a smart phone, tablet, or laptop. BYOD is on the rise. Running Header: Federal CIO Council’s Bring Your Own Device (BYOD) Toolkit 5 References Pearlson, K. & Saunders, C., (2013) Managing & Using Information Systems 5th Edition, Jon Wiley & Sons, Inc. ISBN: 9781118281734 Bring Your Own Device, September 2013, Posted by: EYGM Limited www.ey.com/GRCinsights Security Policies Must Address Legal Implications of BYOD, March 2013, Posted by: Michael Kassner www.techrepublic.com Bring Your Own Devices|The White House, August 2012, Posted by: Digital Services Advisory Group and Federal Chief Information Officers Council http://www.whitehouse.gov/digitalgov/bringyourowndevice. Running Header: Federal CIO Council’s Bring Your Own Device (BYOD) Toolkit 6
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'