Identify three risks that might result from implementing a


Discussion 1

"Bring Your Own Device (BYOD)"

• Many companies, large and small, have implemented Bring Your Own Device (BYOD) policies allowing employees to use their personal smartphones and tablets to conduct business while at work. Debate the major pros and cons of implementing such a policy.

• Identify three risks that might result from implementing a BYOD policy. Suggest a method for mitigating each risk you have identified. Provide a rationale for your response.

Discussion 2

"Security Challenges"

• Distributed applications and cloud computing have become a viable option within the LAN-to-WAN Domain. Discuss the primary challenges related to maintaining the security of both applications and data in such an environment.

• Describe the controls that are needed to ensure the security of distributed applications and data. Identify the auditing approach that you believe is best suited to this arrangement. Provide a rationale for your response.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Identify three risks that might result from implementing a
Reference No:- TGS01702408

Now Priced at $25 (50% Discount)

Recommended (96%)

Rated (4.8/5)