Question

In: Computer Science

A Corporation with a BYOD policy is very concerned about issues that may arise from data...

A Corporation with a BYOD policy is very concerned about issues that may arise from data ownership. The corporation is investigating a new MDM solution and has gathered the following requirements as part of the requirements Gathering phase:

  • each device must be issued a secure token of trust from the corporate pki

  • all corporate applications and local that I must be able to be deleted from essential console

  • cloud storage and backup application must be restricted from the device

  • devices must be on the latest OS version within three weeks of an OS release

Which of the following should be preachers in the new MDM solution to meet these requirements? Select 2

  1.   Application based containerization

  2. Enforced full device encryption

  3. mandatory acceptance of scep system

  4. sideloaded application prevention

  5. biometric requirement to unlock device

  6. over the air update restriction

Solutions

Expert Solution

May this helps you...

Since, a Corporation with a BYOD policy is very concerned about issues that may arise from data ownership, It should opt for a specific MDM solution that apt for the corporation to maintain it's security measures among their products.

Taking in consideration with the MDM solution i.e, Mobile Device Management, which mainly foucuses on the administration of mobile devices, such as smartphones, tablet computers and laptops, out of all the above parameters, enforced full device encryption and mandatory acceptance of scep system should be taken care off.

Before getting further behind the reason for opting these two options, first, let's talk about BYOD policy:

Bring your own device, BYOD, is the evolving trend of employees using their personal devices for work purposes. The device mentioned here might be a laptop, smartphone, tablet, portable disk drive or any consumer piece of data technology.
Companies may utilize BYOD or a subset of the trend, like BYOC, or bring your own computer. Whatever level of consumer technology a corporation allows within its greater IT infrastructure, an equivalent benefits and risks apply.

Now, if we talk about the two prechers in the new MDM solutions, the first one is, enforced full device encryption.

Enforced Encryption allows IT Administrators to increase their Device Control policy and confirm all confidential data transferred to USB storage devices is automatically encrypted. The solution are often used on both macOS and Windows computers.
The Enforced Encryption functionality is enabled from Device Control, by assigning the “Allow Access if device is Trusted Device Level 1+” right to USB Storage Devices, - on Global/Group/Computer or User level. As soon because the user connects their USB device to their computer where the Endpoint Protector client is installed, the encryption application called EasyLock are going to be automatically pushed onto the device, prompting the user to define a password for the application.
After the EasyLock application has been successfully installed on the USB, the user can copy files from their computer inside the encrypted container of the device, this manner ensuring those files are safe and not accessed by any other person that might get a hold of the USB drive, without knowing the password.
Using the Enforced Encryption functionality gives the administrator the possibility to centrally manage the encrypted devices, by changing user's password, resetting the device, sending messages etc.
Compared to FileVault or BitLocker, the EasyLock encryption application is cross-platform, - so a user can encrypt files on a Mac and decrypt them on a Windows machine.

And the other parameter is, mandatory acceptance of scep system, it is an antivirus and anti-malware tool for Windows. With SCEP you'll manage antimalware policies and Windows Firewall settings for multiple computers located throughout your network. The solution is used by many enterprises and educational institutions to protect endpoints from online threats like malware.
SCEP comes integrated with the system management software Center and offers a client for Windows, Mac, and Linux devices. You can use Microsoft System Center Configuration Manager (SCCM) to manage SCEP.


Related Solutions

Select a common ethical issues that may arise in the international business setting from a news...
Select a common ethical issues that may arise in the international business setting from a news source, such as electronic local newspapers, New York Times, International Business Times, Economic Times, or CNN News. Provide a summary of the article. Explain the root cause of these issues. Discuss how managers of international firms should address these issues. please provide the name of article
Select a common ethical issues that may arise in the international business setting from a news...
Select a common ethical issues that may arise in the international business setting from a news source, such as electronic local newspapers, New York Times, International Business Times, Economic Times, or CNN News. Provide a summary of the article. Explain the root cause of these issues. Discuss how managers of international firms should address these issues.
Describe any information policy or ethical issues that arise from the existence of businesses customer profiling...
Describe any information policy or ethical issues that arise from the existence of businesses customer profiling based on a variety of data sources, including social media and mobile phone data.
explain the security,legal and ethical issues that may arise from development and use of computer software?
explain the security,legal and ethical issues that may arise from development and use of computer software?
Describe the Ramsey rule for optimal commodity taxation. Discuss potential equity issues that may arise from...
Describe the Ramsey rule for optimal commodity taxation. Discuss potential equity issues that may arise from the use of this rule.
Serious intergenerational equity issues may arise from slow progress in addressing climate change. True or False...
Serious intergenerational equity issues may arise from slow progress in addressing climate change. True or False and explain
Discuss some of the legal and ethical issues that may arise out of the collection methods...
Discuss some of the legal and ethical issues that may arise out of the collection methods that you have found in the literature.
For this assignment discuss the importance of ethics in financial accounting. What issues may arise if...
For this assignment discuss the importance of ethics in financial accounting. What issues may arise if ethics is compromised? How would this impact the company internally, how would it impact the external users such as investors, creditors, government, etc?
What are some ethical issues that can arise when dealing with data?
What are some ethical issues that can arise when dealing with data?
The various scenarios below involve issues that may arise for entities that prepare their financial statements...
The various scenarios below involve issues that may arise for entities that prepare their financial statements using a special purpose framework (SPF). Required—Provide the information requested in each scenario. 1. Silver Company is a cash method taxpayer and uses this basis for its financial statements. It has a 20% tax rate, began fiscal 2019 with retained earnings of $25,000, and has determined pre-tax amounts for fiscal 2019 as follows—revenues and expenses total $100,000 and $60,000, respectively, with the former including...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT