Overview As a security analyst, even though it may not relate immediately to you

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now

Overview
As a security analyst, even though it may not relate immediately to your day-to-day job, it’s a best practice to be aware of emerging trends in the industry because they may eventually affect your organization. Think about how fast mobile devices have evolved and become pervasive in both business and personal applications. Managing emerging technologies requires a two-pronged approach: the technological aspect and the social aspect. You might need to upgrade your system and your policies that affect employee behaviors. There is often no right or wrong answer when integrating emerging technologies as long as the technology isn’t detrimental to your system; however, following best practices as defined by the industry, staying current with trade publications, and networking with your peers will help you be successful. As you address the technological and policy-related updates of implementing emerging technology in your organization, it is important to think about what it means to use the technology and adhere to the policies you are updating. Using a systems-thinking approach can help with this.
Scenario
You are a cybersecurity analyst, and your organization has noticed a new trend. More and more employees are bringing their personal devices to work and connecting them to the company’s Wi-Fi. The security team has recognized this as an issue and has decided to create a new segmented network for employees to use for their personal devices. This is a more secure solution because it separates data traffic for personal use and allows the organization to encrypt the communication. This benefits both the employees who want to use their personal devices at work and the organization.
This change to the system includes two steps from two different teams. The IT team is going to build the isolated secure network for employees only, and the security team needs to update the bring your own device (BYOD) policy. Your manager has asked you to draft the update to this policy. Your requirement is to update the policy to reflect the changes in the system in response to this new initiative.
Prompt
Review your organization’s BYOD policy in the Module Six Activity document linked in the Supporting Materials below. After reviewing the BYOD policy, write a response in which you describe a possible modification you would make to this policy to reflect the changes in the system from the scenario. Your response should also describe the impact that this policy update could have on organizational culture.
You must address the critical elements listed below.
Policy Update
Identify three of the most important policy statements from the BYOD policy and explain why they are essential to protecting the organization.
Describe a possible revision to the BYOD policy to meet the new requirement from the emerging workplace trend.
Organizational Impacts
Describe the impacts of this policy update on the organizational culture. For example, if you are aware that your use of personal devices on the company network is being monitored, would this change your behavior? Should it?
From a systems thinking approach, explain how this policy update may affect other organizational processes. For example, will the policy update affect the workflow of other employees?
What to Submit
Your submission should be 1 to 2 pages in length. Use double spacing, 12-point Times New Roman font, and one-inch margins. All sources must be cited using APA format. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.
Supporting Materials
The following resource supports your work on the assignment:
Resource: Module Six Activity
This document describes your organization’s BYOD policy. Use this resource to complete the activity.

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now


Posted

in

by

Tags: