USE CASE #1 Organizations globally are adopting the concept of BYOD
(Bring Your Own Device). enabling users to compute using cloud
technologies and use Web-based tools including social media sites as a
way to do business, share knowledge, conduct training, and communicate.
Many of these organizations are mandating that you either install
software on your device to protect their interest or not access these
systems at all. The software captures every action taken to ensure the
enterprise backbone (be it the school or corporation) is safe. Two
Questions • If you are the owner of a device (i.e. iPhone, iPad, Laptop
etc) or even work remotely using your own telecommunications provider
(i.e. high speed Internet) to conduct your work, do you think that it is
appropriate to put restrictions on the user? Why or why not? • What do
you think is the happy medium? Should the organization also control and
own the data - or is it the device owner who owns the data and
responsible for securing that data? USE CASE #2 Schools and training
organizations constantly push for the use of social media as a learning
agent. Yet, social media is often considered the “wild west”. The “wild
west” includes access to downloads that can be virus prone, links that
take you to spam-like content and/or opt-in list, or systems that can
compromise not only computer security but the server which is
controlling Internet traffic. One Question • What kind of policies would
you implement to ensure people in your organization are safe in the
world of social media, and that organizational infrastructure is not
compromised by a social media security breach?
.
CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com
No comments:
Post a Comment