Question: Bring Your Own Device ( BYOD ) Security Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the internet

Bring Your Own Device (BYOD) Security Policy
Free Use Disclaimer: This policy was created by or for the SANS Institute for the internet community. All or parts of this policy can be freely used for your organization. There is no prior approval required.
Last Update Status: Updated August 2019
1. Overview
Provide some information on how widely used tablets, smartphones, and laptops are in modern enterprises. Try to identify threats that are associated to these devices.
2. Purpose
The main goal of any IT security policy is to protect confidentiality, integrity, and availability (CIA) of data. With that said, one reason to have the BYOD security policy is to identify devices that introduce unnecessary vulnerabilities to the organization's computing resources. Address how timely discovery of such vulnerabilities will reduce the attack vector on an organization's computing resources.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Finance Questions!