WebQuest
BYOD - Bring Your Own Device
Process
Assumptions:
Bring Your Own Device (BYOD) is policy that must be signed off by corporate as well as legal. Due to the potential security violations that can occur when introducing personal devices to corporate Furthermore, there is the assumption that all network equipment to implement this solutions has been procured and/or configured to allow for these devices to access various systems. Likewise, technical teams have been trained and briefed on this technical solution.
1. First, there must be standards implemented on what type of devices will be allowed (i.e. mobile phones, tablets, or laptops). This step is important as to determine the number of devices that will have access to the network.
2. Set standards to for these subset of devices. For instance, all must have certain operating systems and virus protection. Mobile devices must meet company standard for mobile OS.
3. Create company disclaimer. This document should detail policies for device as well as disclaimer stating company reserves right to request access when deemed necessary to said device.
4. Determine what company applications and systems will be accessible from these devices.
Process Websites:
http://www.techradar.com/us/news/computing/what-is-byod-and-why-is-it-important--1175088
http://www.ibm.com/mobilefirst/us/en/bring-your-own-device/byod.html
http://www.itmanagerdaily.com/byod-policy-template/
Technical Websites:
http://www.cisco.com/c/dam/en/us/td/docs/security/ise/how_to/HowTo-61-BYOD-Onboarding_Registering_and_Provisioning.pdf
http://www.cisco.com/c/en/us/td/docs/wireless/technology/5760_deploy/CT5760_Controller_Deployment_Guide/Bring_Your_Own_Device_BYOD_Security_Configuration.html
http://www.arubanetworks.com/pdf/technology/whitepapers/WP_BYOD.pdf
Technical Books:
Cisco ISE for BYOD and Secure Unified Access
by Aaron T Woland and Jamey Heary
The Public URL for this WebQuest:
http://zunal.com/webquest.php?w=314805
WebQuest Hits: 619
Save WebQuest as PDF