Question

In: Computer Science

Scenario: The IT leadership team has determined that the college will add another satellite campus. Students...

Scenario: The IT leadership team has determined that the college will add another satellite campus.

Students will be allowed to connect to the network from personally-owned mobile devices. Troubleshooting services will be limited for the students so you must provide a Bring Your Own Device (BYOD) best practice guideline for students to help them manage their personal mobile devices. Your task is creating document demonstrating how to configure the mobile device settings as followstaking screenshotsto demonstrate your knowledge:

Android or Apple:

  1. Update your operating system and applications
  2. Back up your data
  3. Limit ad tracking under "Privacy, Advertising"
  4. Set up SIM card lock
  5. Disable Bluetooth and/or WIFI when not in use
  6. Set up email on your mobile device

Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations, and provide a 350-word narrative using Microsoft® Word to assist the student in applying appropriate settings to their device.

Solutions

Expert Solution

Road map to connect on network

As discuss earlier out IT Leadership team already implement a new satellite in our campus every student is allowed to connect with this network through their Mobile devices. This is a private network manage by the collage and BYOD policy template has been implemented in the network for that reason troubleshoot are limited and all user of the network must follow the BYOD policy. To connect the BYOD network your mobile device, need to be configure properly.

In the later slides we are going to discuss what is BYOD and its policy and step need to configure the mobile device.

  • What is BYOD?

Bring your own device (BYOD) programs has three critical components: a software application for managing the devices connecting to the network, a written policy outlining the responsibilities for the users, and an agreement that user must sign, acknowledging that they have read and understand the policy.

Any leadership during the planning stage include: Which web browsers should be use? Which security tools offer the best protection for the range of devices that will be allowed to connect to the network? What level of support is IT expected to provide? To make sure nothing is overlooked, put trained people to monitor.

Network provider XYZ grants its user the privilege of purchasing and using smartphones and tablets of their choosing at work for their convenience. XYZ reserves the right to revoke this privilege if users do not abide by the policies and procedures outlined below.

This policy is intended to protect the security and integrity of XYZ’s data and technology infrastructure. Limited exceptions to the policy may occur due to variations in devices and platforms.

XYZ users must agree to the terms and conditions set forth in this policy in order to be able to connect their devices to the company network.

  • Step by Step configuration:

System Software: Android 6.0 or Higher version supported.

Smartphones including iPhone, Android, Blackberry and Windows phones are allowed (the list should be as detailed as necessary including models, operating systems, versions, etc.)

Devices must be presented to IT for proper job provisioning and configuration of standard apps, such as browsers, office productivity software and security tools, before they can access the network.

Back up your data: All the data need to be backup before connect to the network. Pl. refer below backup image. Go to setting backup and reset select backup.

Limit ad tracking under "Privacy, Advertising”: In order to prevent unauthorized access, devices must be password protected using the features of the device and a strong password is required to access the company network. Passwords must be at least six characters and a combination of upper- and lower-case letters, numbers and symbols. Passwords will be rotated every 90 days and the new password can’t be one of 15 previous passwords.

The device must lock itself with a password or PIN if it’s idle for five minutes.

After five failed login attempts, the device will lock. Contact IT to regain access.

Rooted (Android) or jailbroken (iOS) devices are strictly forbidden from accessing the network

Automatically prevented from downloading, installing and using any app that does not appear on the College list of approved apps

Access to network data is limited based on user profiles defined by IT and automatically enforced

Set up SIM card lock: To use the network you have to setup simcard lock.

                                    Go to setting and then simcard and set up the lock for better reference follow the below screenshot name simcard lock.

Disable Bluetooth and/or WIFI when not in use : Disable Bluetooth and WIFI when it not in use .

                                    Go to setting and then connectivity and then turn off the WIFI and Bluetooth.

Set up email on your mobile device: When setup the device first time setup the email account by clicking signup and enter name password, email and other details to open the email account and once its created use the email credential to login.



Related Solutions

Cars on Campus. Statistics students at a community college wonder whether the cars belonging to students...
Cars on Campus. Statistics students at a community college wonder whether the cars belonging to students are, on average, older than the cars belonging to faculty. They select a random sample of 11 cars in the student parking lot and find the average age to be 7.5 years with a standard deviation of 5.6 years. A random sample of 20 cars in the faculty parking lot have an average age of 4.2 years with a standard deviation of 4 years....
Cars on Campus. Statistics students at a community college wonder whether the cars belonging to students...
Cars on Campus. Statistics students at a community college wonder whether the cars belonging to students are, on average, older than the cars belonging to faculty. They select a random sample of 47 cars in the student parking lot and find the average age to be 9.7 years with a standard deviation of 6.5 years. A random sample of 48 cars in the faculty parking lot have an average age of 3 years with a standard deviation of 3.8 years....
Suppose a study determines that the amount of time that college students on a given campus...
Suppose a study determines that the amount of time that college students on a given campus work out each week changes from university to university. You are intrigued by this and randomly interview 60 BU students. You find that the average weekly gym time is 3 hours, and the standard deviation is 1 hour. i. Is the sample mean normally distributed? Why or why not?   ii. Your friend thinks the average gym time for Boston University students is equal to...
It has been determined, with 90% confidence, that the proportion of students who graduate from college...
It has been determined, with 90% confidence, that the proportion of students who graduate from college are able to find a job in their field of study lies between 64% and 83%. Using this information answer the following questions. What is the sample proportion? What is the margin of error? Interpret this confidence interval in the context of this problem. ​​​​​​​​​​​​​​What would happen to this interval if the confidence level were to increase to 95%?
The Scenario: You and your team have acquired a project from another team. The Request: You...
The Scenario: You and your team have acquired a project from another team. The Request: You have been tasked with debugging and creating the missing functionality and then creating branches to create the necessary changes to deploy to each of the mobile OS platforms , iOS and Android. Requirements and Information: Create a plan for how your team will create the necessary changes and updates with peer review and revisions. (branches, pulls, and commits) Fork the project and execute your...
Task: Network planning A university has a main campus and a remote campus at another location....
Task: Network planning A university has a main campus and a remote campus at another location. The default router to the Internet on the main campus has an IP address of 10.0.0.1/24. The main campus network is connected to the Internet through a router called RouterA. The main campus has no more than 15000 staff and students. The remote campus network is connected to the main campus network through a router called RouterB. The remote campus has no more than...
After surveying students at a​ college, a campus organization calculated that a​ 95% confidence interval for...
After surveying students at a​ college, a campus organization calculated that a​ 95% confidence interval for the mean cost of food for one term is​ ($1372, $1562). Now the organization is trying to write its report and is considering the following interpretations. Comment on each. Complete parts a through e below. a) 95% of all students pay between​ $1372 and​ $1562 for food. Comment on the given interpretation. Choose the correct answer below. A. The interpretation is incorrect. A confidence...
A study involving is conducted among the students on a college campus. the stress score follow...
A study involving is conducted among the students on a college campus. the stress score follow a uniform distribution with the lowest stress score equal to one and the highest to five. using a sample of 75 students. Find the 95th percentile for the mean stress score for the 75 students.
Suppose a student carrying a flu virus returns to an isolated college campus of 1000 students.
Suppose a student carrying a flu virus returns to an isolated college campus of 1000 students. Determine a differential equation governing the number of students x(t) who have contracted the flu if the rate at which the disease spreads is proportional to the number of interactions between the number of students with the flu and the number of students who have not yet been exposed to it
20. In a survey of 735 students at Broward College, North Campus, results revealed that 283...
20. In a survey of 735 students at Broward College, North Campus, results revealed that 283 students were foreign-born and 452 were native-born. Using these results, conduct a hypothesis test to test the claim, at the .03 significance level, that the proportion of students who are born outside of the USA is greater than 35 percent. Be sure to show all the steps in the hypothesis testing procedure including the null and alternative hypotheses, the calculation of the test statistic,...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT