Skip to main content

Environment in which Intel operates


            Intel Company operates in an environment that has risks in terms of data security. Initially, all the employees used the company computers in the daily activities in which they shared information over the same network. However, the implementation of the Bring Your Own Device (BYOD) policy within the company created a number of security challenges (Richard Ivey, 2013). Information assurance requires that the data and information traversed over a network follows the requirements of confidentiality, integrity, and availability. Confidentiality is an issue following the implementation of the BYOD policy. It is because employees can have access to the company’s information anywhere they are. If the devices they use get into malicious hands, it easy for a compromise on the confidentiality of the information to occur.


            Also, the company cannot fully ensure the security of the corporate information stored in the devices since the company does not have full access to it. Thus, it becomes a challenge in ensuring the security of the corporate information that raises questions on the integrity issues. The role of the corporate oversight of the IT professionals and information assurance officers is a challenge since there is no uniformity in the technologies used by the employees. Accountability is the main issue around which the BYOD policy operates. The information Technology team is accountable for the provision of a technology that can handle the looming danger of porous information security. There should be a technology designed in a way that can manage the devices. The employees are also at risk if they do not understand the risk of the devices brought to the company.             

Threat environment of Intel
            Intel Company operates in an environment having a lot of consumerisation of IT. There are difficulties in securing the buy-in for any consumerisation of IT initiative in the legal and accounting fields. Thus, any issue that may arise becomes challenging to follow. The Company faces the threat of hacking, viruses and identity thefts due to failed data security. Some malicious people may get access to the company’s privacy due to the use of unregulated devices in the work place. It is a problem that arose from the adoption of the Consumerisation of IT services. Hacking can occur on the employees’ devices where those interested gain illegal access of the information stored and passed through the devices. Viruses and malware software are also common threats in the environment in which Intel Company operates. The use of many and diverse devices in the workplace poses a threat to the information security in reference to the exposure from the internet.
            The other issue regards the e-Discovery feature in which Intel does not own any of the devices. Thus, the making any retrieval of the corporate data may be difficult because the data may be in the corporate network, a server, a cloud, or the device itself.        
Best Approaches for implementing information assurance principles
            Information assurance ensures that the Company’s data and information is safe and the users can also retrieve it with ease as a result of risk management. Thus, it is a requirement that companies implement assurance principles that can prevent the common threats to data security. One of the approaches is setting standards in the company that every user of a network should comply. There should also be the assessment and classification of the information assets over a network that requires protection. The other approach is conducting a risk assessment of the IT assets within a Company. A risk assessment procedure entails also the consideration of the impact of the threats to the Company. Another approach is developing a risk management plan that has mitigation, elimination, and transfer of risks, detection, and responding to threats (Schou & Hernandez, 2014).
            The current protocols and policies at Intel require improvement since they pose a threat to information security. The use of different devices over the same network within the Company is the main source of threat. There should be proper monitoring strategies for all the devices within the network which is a challenging issue to handle.
Threats and Vulnerabilities of Intel and the possible ways of mitigating the risks
The major threats and vulnerabilities are due to the BYOD policy that allows the use of personal devices in the workplace.
Risk and Vulnerability

Mitigation  strategy
Data and information compromise to confidentiality
Ensuring that the corporate information accessed through the devices and other assets information have appropriate firewall and encryption features to avoid getting into wrong hands.  The other mitigation plan can involve the implementation of the remote-wipe capability to all devices. In the event of theft or loss of the device, the unauthorized person cannot have access to any information (Daniels, 2014).
Vulnerability to viruses and malware
Though it is challenging to have a common method of centralized management of all the data; there can be a back up of all the data and information used. It helps to avoid challenges in retrieval in case of viruses and malware. 
Device security
The company can enact a policy having the guidelines for the use of any devices and also have a list of the managed and the unmanaged devices. Thus, only the managed devices could be allowed to have access to the corporate data.


References
Corey Schou & Steven Hernandez (2014) Information Assurance Handbook: Effective Computer            Security and Risk Management Strategies, McGraw Hill Professional publishers, 2014,        ISBN 0071826319, 9780071826310
Daniels, D. B. (2014). Cybersecurity Implications in Mobile Device Augmented Reality    Applications. GSTF Journal on Computing, 4(1), 74-76. doi:10.5176/2251-3043_4.1.311
Richard Ivey (2013) Intel Corporation: Bring your Own Device, University of Western Ontario,   pp. 1-15.

Sherry Roberts is the author of this paper. A senior editor at MeldaResearch.Com in nursing essay writing service services. If you need a similar paper you can place your order from best custom term papers.

Comments

Popular posts from this blog

Quality academic papers

For the last ten years, we have been the preferred academic papers service company in many parts of the world ready to partner with students from all corners.

Buy Pre-Written Essay in California

We offer a pre-written essay that meets the instructions provided and observe the academic writing standards that students follow.we guarantee 100% originality.
Research Proposal Writing Service The purpose of writing research proposal services papers is to prove that issues suggested investigating are essential particular field of study.