Answers
BYOD devices are Corporate-owned and Personally-owned endpoints that require access to the corporate network, regardless of their physical location.
BYOD can create a more open, efficient and relaxed environment that benefits both parties.
When you allow employees to bring their own devices to work, it can create a more open, efficient and relaxed environment that benefits both parties. Some BYOD benefits include:
For the Organization:
- Cost Savings
- User pays all or some portion of Device and Service Plan
- Eliminates or reduces IT infrastructure
- Increases employee productivity - ease of telecommuting with the personal device.
For Employees:
- Avoid carrying an additional device
- Ability to use device employee wants to use
- Reduces need for training as using their own device
Risks for BOYD:
-Data Leak
When an employee shares company data from a mobile device with an unauthorized app or third party, may place corporate data at a significant risk
- Theft of data contained on the stolen or lost device
- Employees forward sensitive documents to unauthorized individuals or make them available through unsecured cloud file-sharing provider
- caused by malware in apps
Data Breach: If an employee-owned device connected to the company's network becomes compromised by malware from downloading a malicious app or faulty device security, the whole network is susceptible to this.
Data Loss (risk to the employee, not the organization): Employee Loses data when organization wipes out data on the lost phone or if the employee leaves the company
As well as BYOD can boost your work environment, this policy can open the door to new risks and exposures.
To manage this technology and most of them can avoid these risks.
Although BYOD can boost your work environment, this policy can open the door to new risks and exposures. To avoid these risks, businesses must understand what they entail and how they can provide an extra layer of protection to secure critical data.
Where and how is it getting the IP addresses and it uses?
Each device connected to the Internet is required to have a unique number identifying it, called an IP address. A typical IP address is expressed as a series of numbers separated by decimal points as follows:
197.169.73.63
One way to find out your IP address is to go to Google and type "what's my IP". Google will show your IP address at the top of the search results.
IP addresses are either assigned statically or dynamically.
When a computer has static addressing, it means that the IP address never changes.
Static IP addresses are most likely assigned manually by a network administrator.
Dynamic addressing is normally handled by the dynamic host configuration protocol (DHCP). When a user logs on to an ISP's server, the DHCP server assigns that using an IP address for the duration of the session. These temporary IP addresses may or may not be the same from session to session.
Computers consult the domain name system (DNS) server. The DNS server contains a mapping of domain names with their corresponding IP addresses. The default DNS server contacts one of the DNS servers.
A root DNS server knows the location of all the DNS servers that contain the master listings for an entire top-level domain. It uses a database maintained on a domain name system (DNS), which functions like a phone book for the Internet.
.