WIRELESS AND MOBILE COMPUTING SECURITY Assignment: Case Study Name: Harinder Singh Student ID: 10405167 Submitted to: Peter Hannay Unit Code: CSI6218
P a g e|1 Table of Contents Executive Summary:........................................................................................................................3 Background of task:.........................................................................................................................4 Positive aspects of BYOD:..............................................................................................................5 Cost Reduction:...........................................................................................................................5 Flexibility:....................................................................................................................................5 Easy information access:.............................................................................................................5 Outside school learning:..............................................................................................................5 Technology familiarity:................................................................................................................5 Negative aspects of BYOD:.............................................................................................................6 Network overload:.......................................................................................................................6 Security concern:.........................................................................................................................6 Data Leakage and Device Theft:.................................................................................................6 Malware or viruses:.....................................................................................................................7 Technical issues:..........................................................................................................................7 Resistance in using technology:...................................................................................................7 Illustration of frauds in school network:..........................................................................................8 Consequences of hacking into school network:...............................................................................8 Insight into Wireless vulnerabilities:...............................................................................................9 Rogue access points:....................................................................................................................9 WEP Encryption:.......................................................................................................................11 Default wi-fi routers:.................................................................................................................12 Improper hardware placement:..................................................................................................12 No network policies and procedure:..........................................................................................13 Comparing existing Case studies with Bradford College:.............................................................14 Kenton County School:..............................................................................................................14 Oak Hills Local School:.............................................................................................................14 Forsyth Country School District:...............................................................................................15 Recommendations:........................................................................................................................15 Run a pilot program before making BYOD official:.................................................................15 Policies and procedures:............................................................................................................15 NAME: HARINDER SINGH STUDENT ID: 10405167
P a g e|2 Website Filtering:.......................................................................................................................16 Staff education:..........................................................................................................................16 BYOD security:.........................................................................................................................16 Backup Servers:.........................................................................................................................16 Mandatory security patches:......................................................................................................17 Mobile Device Management:....................................................................................................17 Disable Autorun feature:............................................................................................................17 Conclusion:....................................................................................................................................17 Glossary:........................................................................................................................................18 References......................................................................................................................................19 NAME: HARINDER SINGH STUDENT ID: 10405167
P a g e|3 Executive Summary: “Bring Your Own Device’’ (BYOD) refers to the policy of permitting employees to bring their privately-owned devices such as laptops, tablets and smartphones in workplace, use these devices to access organization’s information and applications. It was a strategy that was proposed by the Intel’s chief security officer Mallcolm Harkins in 2009 after observing employees who were bringing their own devices at the workplace. He proposed a plan to embrace this trend and use this for cutting down the costs of company and increase productivity [ CITATION BMC15 \l 1033 ]. According to the research by educational institutes in UK and US, 85% of institutes allow students and the staff members to access school network. For the employees in educational sector this idea is worthwhile as it provides extra comfort in using your favorite device on work. They can work from anywhere even in the vacations. On the other side, BYOD makes the network accessibility more flexible and at the same time increases the chances of security breaches and frauds. Appropriate protections like virus protection, appropriate policies, remote wiping of data and locking device after failed attempt to gain access should be included [ CITATION Mic12 \l 1033 ]. The report identifies that BYOD is beneficial for the school but should not be implemented in hurry. Security of college should not be compromised. Some of the recommendations to protect college network are as: BYOD policies should be written down and implemented.
Want to read all 22 pages?
Previewing 5 of 22 pages Upload your study docs or become a member.
Want to read all 22 pages?
Previewing 5 of 22 pages Upload your study docs or become a member.
End of preview
Want to read all 22 pages? Upload your study docs or become a member.