Cybersecurity Incident Report.docx - Cybersecurity Incident...

This preview shows page 1 - 4 out of 23 pages.

Cybersecurity Incident Report CST 630 Executive Summary Wireless networks and bring your own device (BYOD) help increase productivity of the employees and saves money for the employers. Employees can use their devices to stay connected to their colleagues using the wireless in the building. Both wireless and BYOD can
Cybersecurity Incident Report also bring the security posture of a company down if there are no policies governing the way they are used. Since anybody can connect to a wireless network, it has to be made sure that wireless networks will have to be built more secure than wired connections. It is critical a company knows the risks and has plans to mitigate those risks before it allows employees to BYOD and lets them use the wireless network. The purpose of this incident report is to bring forth various wireless and BYOD security plans that ABC should follow. Since BYOD has been introduced, the security attitudes within the company have been lax, which has led to a couple of security incidents that have taken place at ABC. The first was where an employee stole another employee’s identity, so ABC had the employee’s movements tracked. The report mentions various legal statues around tracking employees. The second incident was where an unauthorized device was found on ABC’s network and how ABC handled this by remote configuration management. In the third incident, an employee created an ad-hoc network and accessed confidential information. The report also talks about ad-hoc networks and how they can be detrimental to the organization. Other than these three incidents, the report covers the wireless protocol that ABC uses and how it differs from other the older versions. Wireless and BYOD Security Plan 2
Cybersecurity Incident Report As compared to commonly found wired Internet connections, a wireless local area network (WLAN) provides wireless communication to a small physical area or network using radio or infrared signals. Using WLAN, users can connect to their devices anywhere and everywhere as there is no physical limitation like wired connections. With the shift of businesses worldwide towards WLANs and mobile applications, it has become a norm for employees to bring your own device (BYOD) to work. Businesses are expected to allow and to support devices for users at all times. Some of the reasons companies today are accepting BYOD program is because of employee satisfaction and increased productivity. Even though satisfied employees are a positive for the company, it’s important to note the issues that come with WLAN and BYOD. WLAN just by itself has paved an easier exploitation path for attackers. Throw in insecure BYOD devices in the mix and it is a recipe for disaster. With every device that connects to the company’s network the risk of confidential data leaks increases. Since surfing the web has become so data intensive and cellular network speeds still not at par with wireless fidelity (Wi-Fi) speeds provided at organizations, employees try to find

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture