David L. Haywood
CIS 333 – Networking Security Fundamentals Professor Arend Clayborn
Strayer University
25 January 2015
Bring Your Own Device (BYOD)
Within this paper I will attempt to give a clear picture of this new concept of Bring Your Own Device (BYOD) is about. I’ll do this by compartmentalizing several areas that will be discussed to ensure clarity and understanding of the information I am presenting. The first area of discussion focuses on the meaning of this new concept of BYOD along with identifying the primary benefits of BYOD in organizations, and determining the key ways in which its concepts can enhance an end user’s overall working experience. Next, I’ll make an attempt to analyze in detail …show more content…
The two primary benefits of BYOD in many organizations is first wiping out the need to purchase a different number of gadgets and the circulation of those devices for every region of operation all through the organization. Notwithstanding the past advantage organizations appreciate the lower price tag, lower operational expenses, and supportability of clients and applications, which supporters of the BYOD accept this bodes well for consolidate in its standard operating procedures. Moreover some key ways in which its concepts can enhance an end user’s overall working experience is in today 's business world the gadgets are versatile and lightweight. (Kim & Solomon, 2013) found that “users want small devices that are multifunctional and connected” (p. 78). Furthermore “it allows users to use a single device to make phone calls, access e-mail, and manage schedules” (Kim & Solomon, 2013, p. 78). But with all of this flexibility there are risks. So organizations utilize a BYOD strategy, which is a situated of principles overseeing a corporate IT, division 's level of backing for employee-owned PCs, smartphones and tablets. This BYOD strategy serves to control the utilization and moderate its different issues connected with this new pattern. So organizations employ a BYOD policy, which is a set of rules governing a corporate IT, department’s level of support for employee-owned PCs, smartphones and tablets. This BYOD policy helps to control the usage and mitigate its various problems associated with this new trend. Lets now take a gander at the significant dangers incorporating BYOD and look at security controls and apparatuses that are as of now accessible and being used to deal with these