Section 12.106 Mobile Asset Deployments Flashcards
Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.
Three Main Mobile Device Deployment Models
BYOD (Bring Your Own Device)
● Employees use personal devices for work
● Cost-effective for employers
● Drawbacks include reduced control over security and device management
Three Main Mobile Device Deployment Models
COPE (Corporate-Owned, Personally Enabled)
● The company provides devices for employees
● Greater control over security and standards
● Higher initial investment
● Employees may have privacy concerns or need to carry two devices
CYOD (Choose Your Own Device)
● Employees select devices from a company-approved list
● Balance between employee choice and organisational control
● Similar drawbacks to COPE in terms of initial cost and potential privacy concerns
Selecting the Right Model
Consider the specific needs, budget constraints, and risk appetite of your organization
■ Analyse costs, security, and employee satisfaction
● BYOD may have hidden costs for security and compatibility
● COPE offers more control over devices and supports MDM
● CYOD provides a balance between flexibility and control