IT Examiner School, Seaside, CA
Defining the BYOD Security Problem vs. Workstations
Old (Workstations & Mobile): The “good ole” static password problem
Cyber attacks: phishing,Trojans, malware, root kits, etc. Workstations had to be managed, configured, secured, etc. Data was centralized New (Mobile): Multitude of uncontrolled devices Multitude of unsecured platforms and applications Several attack vectors Firewalls irrelevant Data resides on the endpoints
Defining the BYOD Security Problem (cont.) Security burden is shifting: You can’t completely protect the end-point from a determined attacker As device ownership shifts to the employee, so does the burden for protecting it Mobile Hotspot: Will this activity be allowed with BYOD? Opens the “door” What level of security will be enabled? Should be strongest Tied to a single user/device or multiple users/devices? WiFi: Can open the mobile device for attackers, e.g., Coffee Houses, Airports, Hotels, etc.- open networks OpenWiFi houldn’t be used, particularly for business use
Made with FlippingBook - Online catalogs