Along with mobility, users want to use their own devices on your network accessing e-mail, calendar events, and contacts. Every device that is allowed on a network introduces unique security challenges.
In a 500- to 750-word essay, develop a plan for implementing BYOD security in an enterprise network. Make sure to address the following:
- Summarize at least four security challenges that BYOD and IoT would bring to your organization.
- Discuss how will you handle each devices’ unique security challenges. What areas of the network can these devices connect too? Will you limit their access to certain data?
- Defend the strategy for your design.