Securing BYOD (Bring Your Own Device) in Education: Endpoint Management for School Networks
Author(s):
Anjan Kumar Gundaboina
The implementation of the Bring Your Own Device (BYOD) in learning institutions has brought significant changes in other learning institutions by giving the learners and faculty a chance to use the gadgets of their personal choice. The utilization of LBYG relies on the students’ personal and portable devices, which include laptops, tablets, smart phones etc, enhances the personalization of the learning process, improves the level of interest and the yields, hence productivity in the institutions. In the same respect, on the aspect of operational costs, schools do not require much investment in school-owned hardware owing to BYOD initiatives. This approach also ensures that the educational institutions can manage the available resources well and apply advanced technology to learning. However, the increasing use of BYOD has its issues that that need to be addressed, specifically, in relation to the usability of the connected devices in the school network in a compliant manner.
However, BYOD comes with sever security risks that may endanger institutional information and learning processes. BYOD [Bring Your Own Device] give every bad guy a door point to breach into a network; corrupt, steal or destroy organizational data, or gain unlawful access to an organization’s IT system. This is due to the different types of devices, operating system, and software used by the students and staff which hampers the provision of measures towards containing some of the vulnerabilities. Also, if not properly taken, endpoint security can lead to the compromising of several student and faculty records which are legally sensitive information. This paper aims at explaining why there is a need to adopt effective management of End Point solutions to help in handling of these risks. In view of the insights drawn from the current research studies, analysis of the methodologies, real-life implementation strategies, introduce a broad defense solution that has been specifically designed for educational institutions. Thus, the purpose of this research is to identify the crucial issues related to BYOD that are crucial for protecting school networks while using the advantages of the integrated technologies in learning process.