COMS W4180 Network Security Editing and Proof Reading Services

COMS W4180 Network Security Assessment

COMS W4180 Network Security Editing and Proof Reading Services

This COMS W4180 Network Security Assessment discuss the security risks around BYOD in the workplace.

Task 1: The security risks around BYOD (Bring Your Own Device) in the workplace


Bring your own device (BYOD) implies the policy of allowing the employees to carry the personally owned mobile devices such as laptops, smart phones and tables to the workplace. The devices can be used to make use of the privileged company information as well as application. This aspect is also applicable in the educational settings. BYOD is highly supported in the business world. This widens the capacity for lifelong learning.

COMS W4180 Network Security Assessment


BYOD is widely adopted by several industries. The education industry is found to display the application of BYOD by the maximum percentage of people. This accounts to 95.25%. There are numerous advantages that BYOD could offer. Increased productivity, satisfaction of employees and cost savings for the company are some of the advantages due to which the companies have been promoting the same technique. Instead of furnishing the necessary technologies for the employees, companies can save costs when BYOD is applied and permitted to all of its employees.

Security risks

Today’s BYOD era exposes the companies to experience numerous security risks. Some of the major risks are listed below.

  • Unknown third – party access – This access will affect the privacy setting of the sensitive and corporate information. The mobile apps might either be pre-infected with malware or use it as a mode to hack the server to steal information. This requires the companies to blacklist at – risk software in order to control the safety levels associated with the data (Phneah, 2013).
  • Difficulties in tracking data – The adoption of cloud and mobile storage support has tightened the organizations to track the data used by the end users. It is essential for the companies to regard the content security tool so as to prevent the data loss and append features to track the data as well as control the degree of access.
  • Data management and difficulties in segregation
  • Leakage of data – There are chances for mobile devices to get stolen or lost at any point of time. In that case, the data gets leaked. This demands the companies to apply corporate policies to tighten the mobile device security (Phneah, 2013). Additionally, there is a need to ensure a clear balance between the safeguards and the convenience of the users.
  • Disgruntled employees – BYOD remains as a threat when the workers are unhappy with the organization and therefore, the corporate information is compromised to unknown people. Most of the leavers of the organization might not intimate the HR team on the usage of device to deal with corporate information (Phneah, 2013). In that case, the data might get leaked to the rival organizations. Acceptable use policy can remain as a great idea for the companies to control this type of scenario.


BYOD is not a purchasing policy and it requires a better approach to apply in the today’s world. The enterprises have now felt the need to do mobile. The decision of enterprise about BYOD is regarded as application architecture and the solution design. In order to fulfill the demands of BYOD, the application design is complex unlike the development of usage policies or strategic sourcing plans (Gartner, 2013). BYOD has to be a design principle where it offers a flexible architecture and vendor neutral application portfolio.

The BYOD has to look into the field of global class computing. This is an approach ofsystem design and architecture that supports and monitors the computing processes even outside the official environment. In addition to it, the applications strategy needs to be developed in a better way (Gartner, 2013). BYOD implies that internal IT does not offer adequate support for a specific segment and there are numerous alternatives in the external environment. The user community is growing. Therefore, organizations need to build BYOD infrastructure such that it connects the employees, suppliers and customers.

Capacity for lifelong learning

Several organizations (workplace and institutions) have now promoted the people to deploy BYOD. The mainstream state higher education systems have now changed their perceptions about lifelong learning or outside learning. BYOD plays a major role at this place. With the rapid developments in ICT, the institutions have incorporate BYOD approach to the student to develop the knowledge and association to latest technologies (Otuinter, 2013).

The institutions find multiple advantages of BYOD that support lifelong learning. Firstly, the students can access to unlimited resources in an instant manner. Secondly, it remains as an easier approach to communicate and share the process of learning. Thirdly, BYOD permits students to remain as active partners in learning and publish work with just a click (Otuinter, 2013). Fourthly, BYOD enhances the opportunities for the people to learn new tools and have virtual experiences that would reduce the overall consumption of time in the learning. Subsequently, it permits people to build a portfolio of the student learning with the help of cloud applications (Otuinter, 2013).

Why is it essential?

BYOD does expose companies and institutions to numerous security risks. However, the level of convenience is extremely high and the productivity increases irrespective of the location of the individual. The end node problem, phone number problem and disclosure of sensitivity of data might be the probable issues. Yet, these can be managed and controlled with the security policies on the right place within the environment. These policies might possibly reduce the risks. It is essential for three reasons – quick knowledge sharing, quick growth of the company and innovative usage of the applications for the success of the workplace.


  • Phneah, E. (2013), Five security risks of moving data in BYOD era. Retrieved from
  • Gartner (2013), Gartner says bring your own device is an applications strategy, not just a purchasing policy. Retrieved from
  • Otuinter (2013), Why BYOD? Retrieved from

OZ Assignment Help is leading educational consultant and assignment service provider in Australia. Grab the latest offer and quality help from OZ expert Writers.