• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

How much of a risk is BYOD to network security?

September 12, 2016 by Wayne Wilson 4 Comments

With the growing demand for BYOD (Bring Your Own Device) as a possible cost saving measure for many companies, IT networking and security groups have to properly plan for this new IT model. To the untrained eye this might look like a great idea to cut IT costs but in the long run it could cost a company much more than what they saved on pc hardware. Some things to consider:  1) how to properly ensure all pc’s have some form of virus protection, 2) are pc’s being kept up to date with security patches and updates, 3) will BYOD be centrally managed.

Even though this is a novel idea, it’s also a hacker’s playground for mischief once the door is open for them to gain access to your network. This article gave great pointers on processes one should consider if choosing to go down this path. For instance: 1) Create a structured network segmentation strategy, 2) Limit access to systems through a single point and apply fine-grained access controls, 3) Increase authentication to corporate resources, 4) Manage your devices.

I’m currently at this same crossroad in my current position as Director of Desktop Support and Systems Administration. We are seeing the push for people to work from home and also bring those same mobile devices into work to gain access to network resources. The work from home part isn’t new. We currently use VPN tunneling and depending on network access required a RSA token is assigned. What is new is if we will allow BYOD on to our physical network.

Note: Deleted graphic to eliminate authentication request

Filed Under: Week 03: Reconnaisance Tagged With:

Reader Interactions

Comments

  1. Ahmed A. Alkaysi says

    September 13, 2016 at 4:07 pm

    At work we use a VDI to do anything work related. Even if we bring a our own device, we still need to login to the VDI using our RSA tokens. Obvoiusly the VDI isn’t as great performance wise, it solves a lot of the security issues with having to do work on your own device.

    Log in to Reply
  2. Scott Radaszkiewicz says

    September 13, 2016 at 8:35 pm

    I work at a school district. We opened up BYOD 4 years ago. We had many decisions to make. Would we enforce things like Anti-Virus on the machines, updated patches for operating systems, etc. After looking at all the possibilities, we decided our best defense was NO defense. It would be impossible for us to try to enforce those things, even with all the software and appliances out there that check for these types of things. It would merely frustrate the users and stunt the use of BYOD for learning.

    What we did decide to do: use 802,1x so that each user authenticates to the Wifi. BYOD users were assigned to an IP scope that had no access to any other resources on the network except a server for authentication and Internet access. To further limit issues, each graduation class had their own IP subnet, so if you did start to poke around, you could only see a limited number of devices. And we did encourage users to install AV and keep up to date, but we didn’t check/enforce it. We couldn’t!!!

    Log in to Reply
  3. Ioannis S. Haviaras says

    September 13, 2016 at 8:46 pm

    Wayne,

    Great point, Allowing users to BYOD in a workplace is tricky. Having standard workstations allows standardized support and patches to be issued organization wide. Many people who would BYOD also risk of having old hardware requiring more support. Also, since devices might be older they might not be able to even run the standardized antivirus that we might need to implement on the system.

    Log in to Reply
  4. BIlaal Williams says

    September 15, 2016 at 3:44 pm

    I can definitely see how BYOD would be a cost saver for businesses as long as the opportunity cost associated with increased vulnerability to your network is not too high. The more sensitive information the user is requesting access to, the more tricky the situation when handling BYOD. Restricting access to a specific subnet, and limiting access to resources works fine, but what happens if the user is in a position who handles sensitive data such as finance or legal? I think it is important to have some kind of NAC that ensures a device is hardened to a particular point before access is granted into the network. I’ve seen several articles with a quick google search that states the increased popularity of BYOD in the workforce is fueling a comeback of NAC to secure networks.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in