Information security refers to combination of strategies, processes, tools and practices which are designed and implemented to prevent sensitive information from unauthorized access, use, disclosure, disruption or modification. Information security plays a major role in management of information systems. Information systems consist of three components which are hardware, software and network. Information security is characterized by three tributes confidentiality, integrity and availability (Yliopisto, 2014)
Confidentiality refers to preventing unauthorized access and disclosure of private and proprietary information. Integrity refers preventing unauthorized modification or destruction of information and providing authenticity. Integrity means
…show more content…
Personal devices refers to devices that are owned by an individual and not provided by the organization. The devices are also referred to as mobile as they can easily be moved or transported from one place to another. These devices are also capable of accessing wireless networks such as broadband networks, Bluetooth and Wifi networks (Twinomurinzi et al., 2014).
Every organization that has adopted BYOD must also implemented BYOD security policy. BYOD security policy clearly states all the objectives and constraints related to the usage of organizational assess through the use of mobile devices. It describes all activities that are allowed on the devices when are connected to organization network. BYOD Policy should be clear with regard the platforms to be used, services, risks and support or responsibilities and minimum device requirements(Dhingra, 2016)
2.2 Related
…show more content…
While the portability of these compact mobile devices brings many benefits to employees, they are easily lost or stolen. The lost data may lead to tarnished reputations on an organization, loss of competitive advantage and potential litigation issues. Mobile devices loss and theft have become one of the biggest information security risks. Security breach on the mobile device can be expensive to the employee and the organization (Tu et al., 2011).
Individuals find it difficult to have a true boundary between work and home life and that they spend time sharing personal and business information on social networking sites. This is the result of high usage of mobile devices. Mobile devices offers employees all capabilities of social networking. Social networks also increase the risk of information security. Organisations have buried their heads in the sand over the use of social networks and mobile technology in the workplace and need to start dealing with the risks (Colwill,
The ability to record information which is relevant to a product and service will help ensure an exceptional customer experience. The ability to access this information anywhere in the world is also key to supporting the customer. (http://www.cio.com/archive/ec_blueprint.html) Wireless devices such as laptops,
The word integrity comes from the Latin word ‘integritas’, meaning wholeness, coherence, rightness, or purity.
[39] Kevin Johnson and Tony DeLaGrange. SANS Institute. SANS Survey on Mobility/BYOD Security Policies and Practices 2012 [Online] Available from: http://www.sans.org/reading-room/analysts-program/SANS-survey-mobility [Accessed 07 Dec 2013]
Bring Your Own Device also known for short BYOD, is a new corporate that allows employees to use their own devices to do their work.
Integrity is how somebody lives their life. In this life we live, we face choices every day that only we can answer. We dictate how we run our own lives, and they way we run them defines us. Integrity is doing the right thing versus the wrong thing. People, if nothing else, can always have their pride, their integrity. It is something that means a lot to some people and then nothing to others. The ones who value their integrity highly are the good people in this world, and the opposite is true for those who do not value their integrity.
There are number of different models proposed as framework for information security but one of the best model is McCumber model which was designed by John McCumber. In this model the elements to be studied are organized in a cube structure, in which each axis indicates a dissimilar viewpoint of some information security issue and there are three major modules in each axis. This model with 27 little cubes all organized together looks similar like a Rubik's cube. There are three axes in the cube they are: goals desired, Information states, and measures to be taken. At the intersection of three axes you can research on all angles of an information security problem.
Integrity is the quality of being honest. When you are honest about something or a certain situation you are considered a person of integrity. Also when you have integrity you have strong moral principles. When you have strong moral principles you know what is right and what is wrong. “Having integrity means doing the right thing in a reliable way. It's a personality trait that we admire, since it means a person has a moral compass that doesn't waver. It literally means having "wholeness" of character, just as an integer is a "whole number" with no fractions.” Furthermore, having integrity is a quality that many strive to have because it often means that you are a good person.
With the increasingly ubiquitous nature of mobile devices and online availability, including smartphones and tablets, there is also an understandable concern about the level of security that is afforded to such devices. This can be considered as increasingly important given the proliferation of policies such as BYOD (Bring Your Own Device) which is being used by diverse organizations as a way of lowering the cost of ownership for such devices while also leveraging the flexibility advantages that their utilization can bring. It is therefore an area of immense interest due to the changing and emerging nature of both the technology itself as well as the security concerns.
While asking people to bring their own devices can lower costs and improve efficiency, effectiveness and morale, it also raises a host of security and legal compliance concerns. Fortunately, most of these concerns can be addressed through a well-crafted policy.
BYOD is a policy that allows your employees to bring their own smartphones, tablets, and laptops into the workplace. Surveys have indicated that businesses are unable to stop employees from bringing personal devices into the workplace so they came up with a policy to work more efficient with personal devices brought by employees ADVANTAGES •
Integrity is consisting of fate and thru the working of
From the Research that I have done I have found quite a lot of risks for mobile phones. Every phone from different countries has different Security risks. Different risks affect people differently; some are on a really small scale and some risks which can ruin people’s lives.
Bring your own device is the use of devices and applications that are purchased and used by employees, rather than being provided by their company. These types of devices include, smart phones, tablets, and personal computers. The freedom of choosing the technology an employee wants to use has many benefits but also has
The integration of a variety of information systems into business operations is necessary for growth in the dynamic business environment. These information systems can be minimized and fixed into mobile devices such as smartphones. The use of smartphones can play an important role in supporting business processes and operations, developing strategies for competitive advantage and decision making. These smartphones allow employees to be linked to the office, its data and resources, without being in the office. The use of smartphones for business processes can make the business more efficient and effective. They make it easier for co-workers to communicate among themselves and facilitates better communication between the business and its employees, customers, suppliers and even other businesses, and makes it possible in real-time. For CPS Energy and Lloyd’s Construction, although they were doing well, they realised that they could do much better. They needed to find new ways to further cut costs and maximize profitability. They both decided that the best way to do that was through the introduction of smartphones in their business operation.
Upon the advent of social networking websites, an entirely new level of self-expression was formed. People instantly share updates on their lives with family, friends, and colleagues, reconnecting with those they had lost contact with. Social networking has now become an integral part of contemporary society – a modern analog for catching up with friends over slow, conventional methods or finding upcoming events in newspapers. However, along with this freedom of information, the danger of revealing too much personal information has become apparent. As such, online social media poses an imminent danger to society as it blurs the line between private and public information, creating an obsession with sharing one’s personal life online.