100%(10)10 out of 10 people found this document helpful
This preview shows page 1 - 4 out of 23 pages.
Cybersecurity Incident ReportCST 630Executive SummaryWireless networks and bring your own device (BYOD) help increase productivity of the employees and saves money for the employers. Employees can use their devices to stay connected to their colleagues using the wireless in the building. Both wireless and BYOD can
Cybersecurity Incident Reportalso bring the security posture of a company down if there are no policies governing the way they are used. Since anybody can connect to a wireless network, it has to be made sure that wireless networks will have to be built more secure than wired connections. It is critical a company knows the risks and has plans to mitigate those risks before it allows employees to BYOD and lets them use the wireless network. The purpose of this incident report is to bring forth various wireless and BYOD security plans that ABC should follow. Since BYOD has been introduced, the security attitudes within thecompany have been lax, which has led to a couple of security incidents that have taken place at ABC. The first was where an employee stole another employee’s identity, so ABC had the employee’s movements tracked. The report mentions various legal statues around tracking employees. The second incident was where an unauthorized device was found on ABC’s networkand how ABC handled this by remote configuration management. In the third incident, an employee created an ad-hoc network and accessed confidential information. The report also talksabout ad-hoc networks and how they can be detrimental to the organization. Other than these three incidents, the report covers the wireless protocol that ABC uses and how it differs from other the older versions.Wireless and BYOD Security Plan2
Cybersecurity Incident ReportAs compared to commonly found wired Internet connections, a wireless local area network (WLAN) provides wireless communication to a small physical area or network using radio or infrared signals. Using WLAN, users can connect to their devices anywhere and everywhere as there is no physical limitation like wired connections. With the shift of businesses worldwide towards WLANs and mobile applications, it has become a norm for employees to bring your own device (BYOD) to work. Businesses are expected to allow and to support devicesfor users at all times. Some of the reasons companies today are accepting BYOD program is because of employee satisfaction and increased productivity. Even though satisfied employees are a positive for the company, it’s important to note theissues that come with WLAN and BYOD. WLAN just by itself has paved an easier exploitation path for attackers. Throw in insecure BYOD devices in the mix and it is a recipe for disaster. With every device that connects to the company’s network the risk of confidential data leaks increases. Since surfing the web has become so data intensive and cellular network speeds still not at par with wireless fidelity (Wi-Fi) speeds provided at organizations, employees try to find