CIS 512 Wk 5 Advanced Computer Architecture IT Systems Practice

CIS 512 Wk 5 Advanced Computer Architecture IT Systems Practice


Week5 Discussion


Some organizations have implemented bring your own device (BYOD) policies. This enables organizations to save money on equipment costs because employees are now using their personal computers. At the same time, BYOD policies also present challenges for organizations. Now organizations are in the business of supporting personal computers.


Go to Basic Search: Strayer University Online Library to locate and integrate at least two quality, academic resources (in addition to your textbook) on BYOD policies and the challenges associated with them. You may also use government websites, such as Cybersecurity from the National Institute of Standards and Technology.




Please respond to the following in a post of at least 200 words:


Describe some of the specific challenges (for example, risks of employees going to various websites, viruses, and legal implications) associated with BYOD policies.

Recommend methods organizations can use to address the challenges associated with BYOD policies.

Provide full citations and references, formatted according to Strayer Writing Standards.

For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.



In 60 to 75 words, please respond to at least one other post. Choose to respond to those who have few or no responses.




Post from Austyn that you have to respond




Hello professor and classmates,


I hope everyone is doing great this week. This week has been a struggle still. Please keep us all in your prayers.


Many companies currently allow you to BYOD. There are pros and cons of BYOD, and they are very evident. Many companies feel that this option is desirable as it allows them to reduce costs. There are some advantages to allowing employees to BYOD. It will help reduce administrative support of devices and usually leave IT resources vacant to be able to support other organizational needs. It will also help to reduce equipment costs unless the organization is compensating employees for their devices. The organization will not own the devices, resulting in not being tasked to replace the lost or stolen device. The deployment time is much more accelerated as the user does bring their device, and the IT team no longer in charge of the deployment.


They are also several cons in regards to BYOD. Agreements in company policy may indicate who is responsible for personal devices’ support. However, the IT team will often find themselves spending support time fixing a device owner’s problem.


There may be the need for less management overhead on devices, but there is still a cost involved for the platform that allows for a BYOD environment to exist. Several examples are software cost and licensing. Understanding what devices are in the BYOD environment and making specific unauthorized devices are present takes incredible time and effective monitoring. The need to be able to support multiple OS platforms and hardware is a challenge and costly.


Data loss is a massive possibility since information copied to BYOD devices can be transferred to external destinations without the organization’s knowledge. A way to avoid this is to ensure the MDM policy does not allow e-mail and attachments to be copied to the BYOD. The inability to enforce wireless connection rules on personal devices provides a high potential for a user to connect to an insecure network. This will allow others to intercept or redirect traffic between the device and the organization’s network. Without total control over the device, the organization could be exposed to risk by devices with vulnerable software.


I enjoyed answering the discussion this week. I hope you all have a wonderful and blessed day!


Austyn Raines






Liwen Chen, Tung-Liang Chen, Hsu-Kuan Liu. Identifying Students’ Perception of Clickers via Bring Your Own Device (Byod) in Flipped Classrooms. International Journal of Organizational Innovation. 2020;13(1):105-117. Accessed February 1, 2021.




Kang Q, Xue L, Morrison A, Tang Y, Chen A, Luo X. Programmable In-Network Security for Context-aware BYOD Policies. 2019. Accessed February 1, 2021.



Place an Order

We do custom work 100% original and plagiarism free .If you need help in any assignment just send us requirements with time limit ,we will quote a price and after your confirmation ,we start working on your assignment. An original work ready for submission provided to you
  • Drop files here or
  • This field is for validation purposes and should be left unchanged.