Section 12.106 Mobile Asset Deployments Flashcards

Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.

1
Q

Three Main Mobile Device Deployment Models

BYOD (Bring Your Own Device)

A

● Employees use personal devices for work

● Cost-effective for employers

● Drawbacks include reduced control over security and device management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Three Main Mobile Device Deployment Models

COPE (Corporate-Owned, Personally Enabled)

A

● The company provides devices for employees

● Greater control over security and standards

● Higher initial investment

● Employees may have privacy concerns or need to carry two devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CYOD (Choose Your Own Device)

A

● Employees select devices from a company-approved list

● Balance between employee choice and organisational control

● Similar drawbacks to COPE in terms of initial cost and potential privacy concerns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Selecting the Right Model

A

Consider the specific needs, budget constraints, and risk appetite of your organization

■ Analyse costs, security, and employee satisfaction

● BYOD may have hidden costs for security and compatibility

● COPE offers more control over devices and supports MDM

● CYOD provides a balance between flexibility and control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly