USE CASE #1 Organizations globally are adopting the concept of BYOD 
(Bring Your Own Device). enabling users to compute using cloud 
technologies and use Web-based tools including social media sites as a 
way to do business, share knowledge, conduct training, and communicate. 
Many of these organizations are mandating that you either install 
software on your device to protect their interest or not access these 
systems at all. The software captures every action taken to ensure the 
enterprise backbone (be it the school or corporation) is safe. Two 
Questions • If you are the owner of a device (i.e. iPhone, iPad, Laptop 
etc) or even work remotely using your own telecommunications provider 
(i.e. high speed Internet) to conduct your work, do you think that it is
 appropriate to put restrictions on the user? Why or why not? • What do 
you think is the happy medium? Should the organization also control and 
own the data - or is it the device owner who owns the data and 
responsible for securing that data? USE CASE #2 Schools and training 
organizations constantly push for the use of social media as a learning 
agent. Yet, social media is often considered the “wild west”. The “wild 
west” includes access to downloads that can be virus prone, links that 
take you to spam-like content and/or opt-in list, or systems that can 
compromise not only computer security but the server which is 
controlling Internet traffic. One Question • What kind of policies would
 you implement to ensure people in your organization are safe in the 
world of social media, and that organizational infrastructure is not 
compromised by a social media security breach?

.
CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com
No comments:
Post a Comment