Create your policy before procuring technology

Assignment Help Computer Engineering
Reference no: EM131613149

I have to review this article in APA format. When it comes to the whole new generation of Internet of Things (IoT)[1], expansive wireless community is 'blowing up' with connectivity.

As a company continues in the 21st Century it also has to evolve with the growing technology to even compete.

The concepts of bring your own device (BYOD)[2] comes to a different level. There was article produced by IBM on this same topic and it is titled 'The Ten Commandments of Bring Your Own Device (BYOD)[3]'.

The commandments are the following:

1. Create your policy before procuring technology

2. Find the devices that are accessing corporate resources

3. Enrollment should be simple

4. Configure your devices over-the-air

5. Help your users help themselves

6. Keep personal information private

7. Keep personal information separate from corporate data

8. Manage data usage

9. Continually monitor devices for noncompliance

10. Enjoy the return on investment (ROI) from BYOD When looking at these it seems quite simple in some ways but that is far from the truth. These BYODs come in all shapes and sizes.

The crafting of these polices need to be priority and look at the current data market to decide which devices will be authorized and what levels of security needs to be adjusted.

This also comes in play when crafting the policies and if they mirror a foundational structure that is laid out in the 'GUIDELINES FOR MANAGING THE SECURITY OF MOBILE DEVICES IN THE ENTERPRISE' from NIST[4].

The overall objective is to support the CIA Model[5]. Once this is achieved then the proper mobile device management (MDM)[6]. As a manager, it is all about planning and research.

I understand that many companies will rush into this technology and just by an MDM off the shelf and turn it on. That is not the proper approach to take by any means. With any build, it takes time, plans and research. Just like building a home, if the foundation is weak the structure will not stand the test of time.

As stated in Isaiah 28:16 - Therefore thus says the Lord GOD, "Behold, I am laying in Zion a stone, a tested stone, A costly cornerstone for the foundation, firmly placed.

He who believes in it will not be disturbed.[7] This holds true even in today's security world.

Verified Expert

It is vital to look for those devices immediately. It will be soon followed by the enrollment and the configuration of the devices. Personal information must be private.

Reference no: EM131613149

Questions Cloud

Newspaper analysis - micro economics : Choose a topic from Micro economics that matters to you and find a recent news article covering that topic - Demand and supply of certain resources in Australia
Analyze at least one major advantage of private networks : Analyze at least one major advantage of private networks and the impact it creates for a communication technology organization.
What is the incremental analysis if the lees choose option : If production does increase dramatically for the Johnson family. What is the incremental analysis if the Lees choose Option 1 over Option 2?
Why indirect approach often used in persuasive messages : It is more courteous and therefore gives the writer the opportunity to build up goodwill before slipping in the sales pitch.
Create your policy before procuring technology : Create your policy before procuring technology - Find the devices that are accessing corporate resources
What will the energy consumption of the new robotics : What will the energy consumption of the new robotics. Make sure sunk costs are included. Whether even better robotics may be available in a short while.
Describe the advantages of atm to those of frame relay : Compare the advantages and disadvantages of ATM to those of frame relay. Recommend the superior technology and explain your rationale.
Construct a query to show the expected payment date : Construct a query that will show the number of days that exist between the first invoice and last invoice, for each month.
Articulate personal interaction with modern leadership : Although the formal paper this week has some personal response, these Journals are intended to be specifically informal and self-reflective.

Reviews

inf1613149

10/6/2017 5:10:17 AM

Without you guys, I'd actually be bombing in more than one aspects of my life. SO THANKFUL!! much thanks to you to boundlessness and past!

len1613149

8/25/2017 1:17:00 AM

I have to review this article in APA format. When it comes to the whole new generation of Internet of Things (IoT)[1], expansive wireless community is 'blowing up' with connectivity. As a company continues in the 21st Century it also has to evolve with the growing technology to even compete.

Write a Review

Computer Engineering Questions & Answers

  Draw a state diagram that depicts a simple system

Draw a state diagram that depicts a simple system that stacks and unstuck a set of Russian "Matryoshka" dolls. Matryoshka dolls are hollow wooden dolls that can be separated in two parts, revealing a smaller doll inside

  Design a 3 bit uniform quantizer

Design a 3-bit uniform quantizer (specify the decision boundaries and representation levels) for a source with a Laplacian pdf with a mean of 3 and a variance of 4.

  Write mips assembly language program that search for number

Linear Search: Write a MIPS assembly language program that can search for a number that entered by user in an array with 20 integer numbers and prints the index

  Describe the steps to complete the list

Promotion time is coming around the corner. In the last board meeting, your supervisor has asked someone to make a list of tables for a Fernandos Skate Shop customer orders.

  Write down a class grade with a method getnumericgrade

note down  a Java program that translates a letter grade into a number grade. Letter grades are A B C D F, possibly followed by + or -. Their numeric values are 4, 3, 2, 1, and 0. There is no F+ or F-. A + increases the numeric value by 0.3, a - d..

  Drawbacks of working with multiple tables

rePresent an instance of a situation where multiple tables would be appropriate in an application and discuss why this approach is needed in this scenario.

  Explain minimum four benefits of modular design

define the design and application of arrays and how an array simplifies program development. Support your answer with a hypothetical real-world example.

  In this assignment you will implement a parallel algorithm

in this assignment you will implement a parallel algorithm that calculates matrix-vector product using mpi processes

  Questioninternet protocol standards are devised throughout

questioninternet protocol standards are devised throughout the efforts of thousands of people all over the world --

  Mathematics in computing

Write the selection sort algorithm

  In your own words explain the nature and purpose of the

write a 200- to 300-word short-answer response for the followingin your own words describe the nature and purpose of

  How do the servers and clients interact

Describe the characteristics of any commercial distributed system you have access to. What services are provided? How do the servers and clients interact?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd