TSA Searches Phones and Laptops



Personal electronic devices are subject to searches by the TSA and CBP agents -travelers beware.  U.S. Agents may request full access to smart phones, tablets and laptops.  Special emphasis is placed on search history, text history, and social media (e.g., Facebook).  TSA/ CBP may temporarily confiscate the device, up to thirty days, or copy the contents of the entire disk for further investigation.

News about digital frisking is en vogue because of recent political events.  However, this specific policy has been in effect before 2011 -during both Bush and Obama administrations. (, 2008).  The less told story, however, is that data is at greatest risk when traveling to other countries.


It may come as a surprise to learn that most Western governments do not respect individual privacy rights -digital or otherwise.  For example, authorities at Paris Charles de Gaulle Airport are known to scan laptops (BBC, 1998).  Devices are also subject to search when traveling through Canada, Australia, or the U.K  -no warrants needed. (Hughes, 2014).  

Encryption to the rescue?  Encryption may protect your data but it's not fail-proof.  For starters, there are different types of encryption.  Some types of encryption are considered strong and nearly impossible to break.  However, encryption uses cryptographic algorithms that become obsolete within months or years.  Implementing secure encryption can be a complicated process.   

What's more, encryption may protect your data, but it will not stop a frustrated border patrol agent from taking your device or arresting you. (Hughes, 2014).

Why the Fuss?

There are two sides to every coin.  Governments have legitimate national security issues to contend with.  Digital search and seizure policies are a simple means to identify terrorists, child pornographers, and other criminal activity.

On the other hand, the majority of international travelers are not criminals.  At least in the U.S., and with exceptions, the right to privacy is a constitutional civil right.  There are legitimate reasons to keep trade secrets, health records, or financial information secret.

Data at Risk

Not all inspections are invasive.  Some agents may simply ask you to turn the device on.  Others may causally browse its contents.   However, there are situations that compromise data integrity:

  • If you provide a key code or password.
  • If the device is removed from your line of sight.
  • If the device is physically connected to another machine (e.g., scanned).
  • If the device connects to an agent's network (Ethernet or WiFi).
If a device is compromised it can no longer be trusted:

  • Your data is no longer confidential (e.g., pictures, credit cards, etc.)
  • Your data may have been altered or deleted.
  • The device may contain a viruses or malware.
  • All of your passwords may be compromised.
  • Your network accounts may be vulnerable (e.g., Exchange, VPN, RDP)


In most situations, digital searches by the TSA/ CBP are probably harmless.  However, it's prudent to take extra precautions when traveling outside the United States.


Review: IT Savvy by Peter Weill

Book Review:  IT Savvy: What Top Executives Must Know to Go from Pain to Gain by Peter Weill.

Peter Weill offers a simple digest on a complex topic:  Best practices and methodology for organizational information and communication.   Weill recognizes most organizations are IT challenged.  However, the right strategy can transform IT from a liability to an asset.

According to Weill, organizations that consistently use IT to elevate performance are IT Savvy. His research suggests that organizations that invest in IT savvy strategies have margins 20% higher than industry average. Organizations without an IT savvy strategy have margins 32% lower.

The IT Savvy model:

  1. Define your Operating Model.
  2. Revamp your IT funding model.  IT will support your operating model.
  3. Build a digitized platform of business processes.  Standardize process that are not going to change. Concentrate on elements that do change. 
  4. Exploit the digitized platform for growth.  Use IT to drive value and extract business. 

Case studies include situations from Aetna, Pfizer, Seven-Eleven Japan (SEJ), and UPS.  For example, Weill demonstrates how SEJ transformed their IT services from strategic liability into an asset.  Examples also include IT funding models, outcome-oriented business cases, and transparency innovations.

IT Savvy is an easy to read and informative book about IT execution.  This is a great book for executives, management, and IT professionals.  Weill provides practical strategies on how to implement IT process improvement throughout the organization.

Company Travel Policy Outline

Executive Summary:  Companies of all sizes benefit from a well designed International and Domestic Travel (IDT) security policy.  This article helps to outline corporate travel strategy and protect company data from compromise.

Travel threats and vulnerabilities.
Public Charging Station at
Mayfair Mall, Milwaukee, WI
 Working remotely requires special precautions.  Smartphones, tablets, and laptops are at high risk of compromise whenever they connect to untrusted networks.  The likelihood of compromises from malware and hackers is greatest when traveling.  Designing a company travel policy helps mitigate many of these risks.

Target Audience:  Network Administrators and IT Managers responsible for securing network resources. 

  1. Network administrators configure all managed laptops.
  2. Minimum precautions are short-term strategies that can be immediately implemented.
  3. Advanced precautions are long-term recommendations that require additional planning.  For example, multi-factor authentication (MFA) is a development process.
Minimum Precautions:

1.     Personal Devices.  Staff are discouraged from using personal devices to connect to corporate resources when traveling.  Do not store sensitive company data on personal devices.

2.    Managed Laptops.  Specially configured corporate laptops and tablets are available for travel.  These devices are configured according to IDT policy guidelines.  Additionally, store all sensitive data on corporate servers whenever possible.

3.    Encryption.  Encryption protects corporate data when devices are not in close proximity.  Managed resources require self-encrypting drives (SEDs) or Microsoft BitLocker; configured with a minimum AES 256-bit hardware encryption.   Laptops and tablets must use Trusted Platform Modules (TPMs) to secure cryptographic keys.   

4.   Windows Firewall Configuration.  Third party networks are not secure mediums.  Untrusted physical Ethernet or Wi-Fi hotspots risks the integrity and confidentiality of corporate data.

Client firewalls must be configured with two basic rules:  (a) permit outbound secure tunnel to connect with a corporate virtual private network (VPN) or remote desktop (RDP) gateway; and (b) deny all other inbound and outbound traffic.

5.    Internet and Remote Access.  Secure Socket Tunnel Protocol (SSTP) VPN or Secure RDP communication is mandatory for all external communications.   All network traffic, including WWW and Email, forwards through secure TLS tunnels.  This process ensures data integrity and confidentiality.  N.B., Do not ignore certificate warnings!

Additionally, SSTP and RDP uses TLS over TCP port 443 which passes through virtually all firewalls and proxy servers.  In other words, this solution should work at hotels and coffee shops throughout the world.
Advanced Precautions:

1.     Preferred Travel Network:  MiFi.  MiFi is a portable broadband router that extends 4G and 3G mobile broadband Internet to laptops, tablets, and smartphones.  MiFi is the preferred Internet service when traveling because it reduces risk of man-in-the-middle attacks (MITM).

a.    MITM attacks are less likely to occur on MiFi networks because hackers require expensive (e.g.. ten thousand dollars) base transceiver stations (BTS) to impersonate telecom wireless networks.  However, costly BTS equipment does not deter professional criminals nor foreign government espionage.  

b.    MiFi Password.  Change the default MiFi password to a randomly generated complex password.

c.    Mifi WAN Mitigation.  Protect WAN communication so that the MiFi router configuration is set to automatically connect to an external IPSec VPN.  Edit the MiFi firewall to only permit external traffic between itself and the corporate VPN server.

d.    MiFi LAN Mitigation.  Local devices should connect to the MiFi router via Ethernet or USB cables whenever possible.  Physical connections from local devices to the MiFi are secure mediums; whereas the internal MiFi wireless access point (WAP) uses vulnerable wireless encryption protocols (e.g., WEP, WPA, and WPA2).  

 Enterprise WPA2 is considered secure wireless protocol, however it requires RADIUS authentication.  WPA2 (i.e., non-Enterprise) can also be used as long as its password is configured with maximum complexity.  Consider changing the WPA2 password at regular intervals to discourage brute-force attacks.

e.    Domestic and International MiFi: Domestic MiFi service is available throughout the United States from AT&T, Sprint, and Verizon.  Monthly service is between $50 to $100 per month.

 XCOM Global provides international MiFi in over 175 countries.  XCOM service costs $395 per month and provides access from all serviceable countries.  Verizon also offers international phone and data coverage.    Their Global Travel program recommends equipment and provides service plans based on destination.

2.    Travel Firewall:  The travel firewall is for situations when MiFi is unavailable.  It protects smart devices and laptops that connect to untrusted networks.   The travel firewall has three functions:  (a) It connects to an external LAN (e.g., hotel Ethernet wall plate) or wireless LAN; (b) it automatically establishes an IPSEC VPN; and (c) it only permits VPN traffic to local devices (i.e., managed laptops).   Travel routers have similar vulnerabilities as MiFi routers.  Windows firewall and SSTP VPNs, further reinforce device security.

Recommended travel firewall:  

Tiny Hardware Firewall (THF) offers portable firewalls that are ideal for remote workers.  THF offers multiple models, all of which are highly portable (i.e., tiny) and are battery and USB powered.  The connection process is very user friendly because of its "bare-bones" GUI.  These firewalls require a public facing OpenVPN server.

3.    Multi-factor authentication.  Multi-factor authentication (MFA) protects against malware, key-loggers, and MITM attacks.  Local logons and network communications (i.e., RDP and SSTP VPNs) are more secure with MFA because corporate systems require at least two separate types of authentication.  If thieves intercept a user password in transit (e.g., Wi-Fi) the authentication integrity remains secure.   

MFA hardens the authentication process, however compromised systems may be vulnerable to NTLM harvesting attacks.  Essentially, Windows stores a password hash for all its user accounts; this includes MFA tokens.  In certain situations, thieves can collect this password hash and use it to access corporate systems (i.e., pass-the-hash). 

4.    Application whitelisting.   AppLocker uses an application whitelist to prevent the execution of unwanted and unknown applications -including malware.  AppLocker is only available on Microsoft Windows 7 Enterprise, and Windows 8.1 Enterprise editions.   

5.    Certificate Pinning.  Microsoft's Enhanced Mitigation Experience Toolkit (EMET) uses SSL certificate pinning to defend against MITM.  Certificate pinning validates the authenticity of VPN and RDP servers by verifying certificate thumbprints.

6.    Secure DNS.  Harden client DNS resources to prevent DNS poisoning and spoofing.  Remote client traffic can be redirected if public facing DNS servers are compromised or impersonated.  It's essential that client traffic only traverses the corporate VPN.  Securing DNS mitigates risk from DNS related threats.

Use a Name Resolution Policy Table (NRPT) policy or edit client host files to prevent changes for all corporate fully qualified domain names (FQDNs).  Consider implementing DNSSec (i.e., DNS integrity checks) to further protect domain integrity.

7.    Persistent States.  Operating systems that boot from read-only media protects clients from compromise.  Examples of read-only media includes CDs or USB flash drives with hardware write protection.  Persistent state clients are less vulnerable to malware because changes are never saved.  Persistent states also prevent hackers from obtaining domain-based password hashes from the local Security Account Manager (SAM).   N.B., This assumes domain credentials were not used to create the original system state.

ZuessGard is an example of a Linux distributions designed "to eliminate malware-borne corporate account takeover attack vectors".  ZuessGard is sold as a bootable read-only USB flash drive which sells for $25 per device. 

Windows may be more appropriate that Linux for corporate solution.  TechNet explains how to create a bootable Windows 7 steady state from a differencing VHD disk.  This solution can boot from USB and should work with Windows 8.

8.    Windows to Go.  Windows 8.1 Enterprise includes a portable operating system called Windows to Go.  This is a fully managed operating system that can be run from any PC or laptop.  This provides employees with an encrypted,  local workstation using to work from their personal devices, and provides them local access to Corporate resources; and provides a secure environment.

Smart Phone Precautions:

Corporate Travel Policy Template
•    Treat smart phones as a computers.
•    Avoid using public Wi-Fi.
•    Disable Wi-Fi, Bluetooth, and GPS when not in use.
•    Public USB charging stations are not safe –they can install malware.    
•    Be wary of text messages from unknown sources– they can install malware.
•    Do not jailbreak or root smart phones.
•    Enforce VPNs. 
•    Manage and enforce a strategic Smart Device Policy.
•    Use the same precautions per domestic recommendations.
•    Remove the smart phone battery when not in use.  Foreign governments and criminals can track your movements using your smart phone.
•    Smart phones are not as secure as managed computers.  Consider using a non-smart phone for all voice communications.  
•    If smart phones are necessary, consider using a phone that is FIPS 140-2 certified.  The phone should be treated as a computer – use encryption, VPN, etc…
•    Consider secure VOIP and IM app (e.g., Microsoft Lync) that only connects to corporate servers.
•    Verizon’s Global Travel program recommends equipment and provides service plans based on destination. 

All electronic communication can be intercepted.  Wireless devices are especially vulnerable. Hotel business centers and phone networks are regularly monitored.  Do not use public computers to connect to any company resources.  Assume all shared computers have key loggers or other malware that collect account credentials.  In some countries, hotel rooms are regularly searched. Corporate and government officials are most at risk, but don’t assume you’re too insignificant to be targeted.
Foreign security services and criminals are adept at “phishing” – that is, pretending to be someone you trust in order to obtain personal or sensitive information.

Store any hardware tokens, battery and subscriber identity module (SIM) card in a separate location from the mobile device.  If traveling in a high-threat location, you must assume that hotel rooms have been selected to facilitate electronic or visual monitoring.

Related Websites:

Validation: Assessment Model of BYOD

Demonstrate the value of ICT.

   This artifact demonstrates the value of ICT research process and methodology.   

   ICT research explores the dissemination of innovations throughout the workplace.  For example, the employee practice of bring your own device (BYOD) is innovative because it changes the way people work.

   This research covers a wide scope of material relating to BYOD.  The literature review explores the origins of BYOD, and is defined by four significant events: 
  •  Moore's Law, as it relates to workplace technology.  Perpetual innovation of computer systems has changed the way people work. 
  • Moore's Law for Power Consumption.  Traditional models do not scale well for mobility becuse computers have an insatiable appetite for power.  
  • Koomey's Law, as it relates to mobile efficiency.  Efficiency gains are revolutionary for battery powered mobile devices. 
  • Grove's Law, as it relates to bandwidth influences.    Grove’s Law transcends bandwidth innovation from cables to the airwaves.  The broadband revolution has begun to take shape and current designs favor mobility. 
   UW-Stout incorporates research methodology throughout the entire ICT curriculumThis research topic is about personal technology in the workplace.  It closely relates to the advanced switching and routing concepts in the emphasis curriculum.

   Employees connect their personal devices to the company network.  Consequently, network threats may manifest as smart devices connect to the corporate network.Unfounded assumptions, “can lead to broken, misconfigured, or bypassed security mechanisms” (Cisco Press, 2010).  An effective network assessment allows companies to make informed decisions.  Managers and network administrators may use it as reference to support decisions on whether to implement, or reject BYOD policy.

Cisco. (2010). 6.4.3 Wireless Security Solutions. In Cisco, CCNA Security Course Booklet (p. 180). Indianapolis, IN: Cisco Press.

ICT Validation: Ethics

Ethical principles relating to ICT and IT Management.

Ethics is a synthesis of three elements, (a) law, (b) morals, (c) and personal conduct:  

A)  Is it legal?   For example, it is illegal to download and install pirated software.  Maintaining good licensing and documentation protects an organization from potential litigation. 

B)  Is it moral?  Society shapes issues of right and wrongand people are expected to uphold common values.  For example, it is unacceptable to abuse administrative authority to look up co-workers' salaries.   

C)  Is it something you would do?  There are circumstances when an action may be both legal, and immoral.  Conversely, a moral remedy may be unlawful.  The controversy surrounding systems administrator, Eric Snowden, serves as a relevant example for ICT ethics and personal conduct.

Snowden is accused of stealing and publishing classified government information.  Reuters reports that Eric Snowden used his role as a systems administrator to persuade co-workers to collect passwords (McNamara, 2013).  

However, Snowden maintains his innocence as a whistle blower.  Snowden argues that the National Security Agency (NSA) illegally collects phone records of millions of Americans (Wiebe, 2013).  Snowden's motivation may be moral, but his actions were illegal.

In a quasi-related case, U.S. Federal District Court Judge, Richard Leon, ruled that the the NSA phone program is likely unconstitutional (Gerstien, 2013).  The Department of Justice is expected to appeal the decision.  The NSA actions are legally unethical if upper courts uphold Leon's decision.  The director of the NSA, Gen. Keith Alexander had previously stated, "I think what we're doing to protect American citizens here is the right thing" (Michaels, J., 2013).

Some view Snowden as a hero, and other's view him as a traitor.  In regard to ICT, Snowden was an unethical system administrator.  Snowden lacks integrity because he abused his administrative privileges by trolling confidential data.

ICT is an institutional process that contributes value to organizations (Brynjolfsson, 2003).  Information Technology (IT) is responsible for an organizations' systems, services, and support. Typical responsibilities include:
  • ICT related purchasing.  
  • Maintaining sensitive data on file servers, databases, and backups.
  •  Ensuring the electronic privacy for all individuals within the organization.
  •  Intellectual property and software licensing.
  •  Preventing digital fraud.
 Network administrators have the "digital" keys to everything on the network.  Network administration requires ethical conduct to ensure standards of integrity, confidentiality, and availability. 

Why did you create this artifact? 

This artifact demonstrates the ethical principles of ICT.  I chose to review The Adventures of an IT Leader, by Robert Austin, Richard Nolan, and Shannon O'Donnell, for a class project.  The story examines typical ICT challenges and presents examples of effective leadership skills to overcome them.  In each situation, the IT leader had to navigate through a variety of ethical issues.   


Brynjolfsson, E. (2003, July). The IT Productivity Gap. Optimize Magazine (21). Retrieved from
Gerstein, J.,  (2013, December 16th).  Retrieved from:
McNamara, J. (2013, November 8th) Retrieved from:
Michaels, J. (2013, June 13th).  Retrieved from:
Wiebe, K., (2013, December 17th).  Retrieved from:

Assessment Model of BYOD: Adoption of Personal Devices at the Workplace

Brief History of Mobile Technology; BYOD Methodology

by Steven Jordan, on December 16th 2013.

Chapter II:  Literature Review

     BYOD refers to personal devices that connect to corporate networks.  BYOD may risk concomitant threats to vulnerable corporate systems.  BYOD policy is a network strategy that manages employees’ personal devices.  Companies without BYOD policy may be unprepared as employees overwhelm network resources with smart phones, tablets, and laptops.

          This literature review contributes to the adoption process of BYOD policy.  The adoption process is an initiation phase that consists of “gathering information, outlining and planning” (Bouman, et al., 2005).  Managers and network administrators may use it as reference to support decisions on whether to implement, or reject BYOD policy.

     This literature review explores the state of BYOD technology in three areas:  (a) historical influences of workplace technologies; (b) qualitative risk and benefit analysis for personal technology at the workplace; and (c) exploration on the selection of BYOD methodology.

This literature review explores the origins of BYOD in chronological order, and is defined by four significant events: (a) Moore’s Law, as it relates to workplace technology; (b) Moore’s Law for Power Consumption; (c) Koomey’s Law, as it relates to mobile efficiency; and (d) Grove’s Law, as it relates to bandwidth controls.

     Moore’s Law.  Gordon Moore established the Intel Corporation in 1968 (Intel, 2013).  Moore’s Law is based on his prediction that states, “The number of transistors incorporated in a chip will approximately double every 24 months” (Intel, 2013).  More’s Law is specific to chip complexity, but it is an approximation for all components within a computer system (Koomey, Berard, & Sanchez, 2011, p. 47).  Perpetual innovation of computer systems has changed the way people work.

     Moore’s Law has influenced corporate computing for nearly a half century.  The first punch card tabulator was invented in the late 1880s and was used to automate U.S. census data (Carr, 2008, p. 45).  Punch cards were common by the 1930s (Carr, 2008, p. 47).  In the 1970s employees worked with terminals and datacenter mainframes (Carr, 2008, p. 52).  In the 1980s employees transitioned to desktop PCs (Carr, 2008, p. 55).  Modern workstations have become standard office technology.

      Moore’s law for power consumption.  The popularity of the workstation has created an imbalance between consumption and efficiency.  Workstations use an average 25% of their processing potential; storage capacities average under 50% utilization (Carr, 2008, p. 56).  Electricity is wasted when resources remain idle.  The workstation model is inefficient because it wastes scarce resources.

     Wu-Chen Feng introduced, “Moore’s law for power consumption – that is, the power consumption of computer nodes doubles every 18 months” (Feng, 2003).  Each generation of computer chips consumes more energy and generates more heat (Carr, 2008, p. 57).  Heat reduces computer component reliability as failure rates double with every 18°F increase in temperature (Koomey, Berard, & Sanchez, 2011, p. 49) (Feng, 2003).  Heat is especially harmful to lithium-ion powered gadgets (i.e., smartphones) (Herman, 2011).  Heat causes the average smart phone to lose 35% of its battery capacity per year (Herman, 2011).

     Moore’s law for power consumption presents an obstacle to mobile computing: (a) computers have an insatiable appetite for power consumption; and (b) heat has a negative impact on mobile efficiency.  The amount of energy required to operate PCs does not scale for mobile computing.  As a result, demand for power exceeds the available supply.  Functional scalability for mobile devices requires innovations in efficiency.

     Koomey’s Law.  Consumption and efficiency are important distinctions.  Koomey’s Law states that electrical efficiency of computations “doubled about every 1.5 years (Koomey, Berard, & Sanchez, 2011, p. 52).  Alternatively, the ratio of power per computation decreases 50% every 1.5 years (Koomey, Berard, & Sanchez, 2011, p. 52).  Koomey’s Law outlines two potential outcomes in regard to computational innovation:  (a) computational capability increases with no change in power consumption; or (b) no change in computational capability with decreases of power consumption.

     Simultaneous increases for power consumption and efficiency are ostensibly at odds. Both models scale well because each variance has different implications.  Consumption is insignificant for workstations because electric outlets supply power.  Efficiency gains are never realized while workstations consume power as their resources remain idle.  On the other hand, mobile devices are battery operated.  Efficiency benefits mobile devices because of their limited supply of power.  Efficiency gains are revolutionary for battery powered mobile devices (Koomey, Berard, & Sanchez, 2011, p. 50).  For example, assume a smart phone manufactured in 2013 will operate for 10 hours.  According to Koomey’s Law, a smart phone manufactured in 2016, with a similar CPU, will operate for 20 hours. Smart devices are available because of efficiency innovations.

     Grove’s Law.  Mobile devices require efficient power to operate.  Mobile devices also require sufficient bandwidth to be useful.  Grove’s Law says, “Telecommunications bandwidth doubles only every century” (Carr, 2008, p. 58).  Claude Shannon’s Information Theory developed the concept of bandwidth.  Shannon’s information formula calculates the maximum rate that data can be sent without error (Hardesty, 2010).

     Shannon’s Information Theory was developed in 1948 (Shannon, 1948).  It took nearly a half a century until large volumes of information (i.e., bandwidth) could be transferred over long distances.   Communication infrastructure was built upon copper cables (Carr, 2008, p. 57).  Data travels across copper cables in the form of alternating current.  Sign waves graph the positive and negative oscilations associated with alternting current (Odom, 2006, p.170).  Freaquency is a sign wave measurement that counts the number of contiguous oscilation cycles per second (i.e. alternating currnet) (Odom, 2006, p.22).  For example, 3400 cycles per second, indicates a frequency of 3400 Hetrz (Hz).  Incidentally, analog traffic uses the frequency range of 300 to 3400 Hz (Cisco, 2012).  The 3400 Hz frequency correlates with the 33.6 Kilobits per second (Kbps) analog modem; and demonstrates bandwidth is proportionate to frequency.  Copper cable restricted most commercial data transmission to the 300 to 3400 Hz frequency range until the 1990s (Cisco, 2012).

     Modern telecommunication infrastructure has “repealed Grove’s Law” (Carr, 2008, p. 60).  Internet fueled growth provides an abundance of fiber optic cable throughout the country (Carr, 2008, p. 59).  Fiber optic cable is an alternative to copper cable for data transport.  Copper cables use alternating currents to transport data.  Fiber optic cables use pulses of light to transport binary (i.e., digital) data (Odem, 2006, p. 149).

     Fiber optic cables differ from copper cables because they operate at higher frequencies (i.e.,  higher bandwidth capacity).  Long-haul copper cables have a maximum frequency of 100 MHz per km (Gambling, 2000, p. 1091). The bandwidth of long-haul copper cable is nearly 10 Megabits per second (Mbps).  Until 1992, fiber optic cables had a maximum frequency of 1000 GHz per km (Gambling, 2000, p. 1089).  The bandwidth of long-haul fiber optic cable is nearly 20 Gigabits per second (Gbps).  There is a 10,000 improvement factor from the introduction of fiber optic cable.  The invention of the erbium fiber amplifier (EDFA) in 1987, significantly increased existing fiber optic bandwidth capacity (Gambling, 2000, p. 1089).  Fiber optic cables, when amplified with EDFA, has a frequency of 5000 GHz per km.  Information pulses at 100 Gbps “over 1,000,000 km with zero error” (Gambling, 2000, p. 1089).

     Grove’s Law transcends bandwidth innovation from cables to the airwaves.  Copper and fiber optics transmit data using electrons and light (Odem, 2006, p. 152).  Wireless media uses complex analog radio waves to transmit data (Odem, 2006, p. 153).  Wireless frequencies encompass a wide scope of services: (a) LANs, (b) metropolitan-area networks (MANs), and (c) wide-area networks (WANs) (Froom, Sivaasubramanian, & Frahim, 2010, p. 425).

     Wireless LAN, MAN, and WAN services operate within the 2.4 GHz to 5 GHz range (Froom, et al., 2010, p. 424).  Wireless network technology was first introduced to the public in 2001 (Standage, 2004).  The Institute of Electrical and Electronic Engineers (IEEE) publish standards that outline wireless technologies (Table 1) (IEEE, 2013).  IEEE standards document substantial increases of wireless bandwidth.  The broadband revolution has begun to take shape and current designs favor mobility.

Risk-Benefit Comparison

     The literature review examines two potential effects of BYOD on an organization:  (a) advantages, and (b) disadvantages.

     Advantages.  ICT departments can be viewed as an institutional process that contributes value to organizations (Brynjolfsson, 2003).  The Alcohol and Tobacco Tax and Trade Bureau (TTB) reduced costs and increased security with their remote access thin client solution (Hughes, 2012).  The TTB policy prevents employees from storing sensitive data on personal property (Hughes, 2012).  TBB’s remote terminal solution reduced legal and compliance complexities (Hughes, 2012).

     Quantifying the value of ICT (e.g., BYOD) is difficult, but not impossible (Brynjolfsson, 2003).  Colgate-Palmolive estimates their BYOD policy saved over $1 million per year by eliminating BlackBerry corporate licenses (Hof, 2011, p. 2).  The savings were realized after BYOD policy allowed personal devices access to corporate email (Hof, 2011, p. 1).

     Organizations can also benefit from with returns on productivity and competitiveness (Brynjolfsson, 2003).  For example, Hyundai incorporates smart phones as part of their manufacturing process (BusinessKorea, 2013).  Workers share multimedia message service (MMS) text messages when defects are discovered on the production line (BusinessKorea, 2013).  Hyundai’s smartphone innovation increased overall production output (BusinessKorea, 2013).

     Disadvantages.  Wireless access points with weak encryption can expose organizations to external hacking attempts (Cisco, 2010, p. 180).  Risk is also introduced when an employee unknowingly connects a compromised device to the corporate network.  Smart devices can introduce malware that targets network equipment and servers (Donohue & Stewart, 2010).

     There was a 155% increase in mobile malware across all smartphone platforms from 2010 to 2011 (Juniper, 2012, p. 6).  There was an additional 614% increase in mobile malware from 2012 to 2013 (Juniper, 2013, p. 15).  Similarly, organizations are at risk when employees copy sensitive corporate data to their personal devices (Juniper, 2013, p. 18).  Statistics based on remote management applications indicate that 17% of mobile devices are lost or stolen on an annual basis (Juniper, 2013, p. 18).

     There are circumstances when BYOD policy exposes the privacy of its employees (Barnes, 2013).  Employees may unknowingly provide their employers with administrative control of personal devices (Barnes, 2013).  Employers gain control when employees use their personal devices to check corporate email (Barnes, 2013).  In theory, employers can read private emails (e.g., Gmail) and view personal pictures (Barnes, 2013).  Furthermore, employers have the ability to remotely wipe any smartphone that synchronizes with corporate email services (Juniper, 2013, p. 18).  There are inherent risks for both employers and employees.

Methodology Models

     Methodology provides the processes, assessments, and analysis necessary to determine if technology management facilitates company goals.  The literature review examines three ICT principles of (a) innovation diffusion, (b) general risk management, and (c) organizational design.

     ICT Diffusion. ICT is the science of organizations and technology.  ICT research explores the dissemination of innovations throughout the workplace.  The employee practice of BYOD is innovative because it changes the way people work.  Each step of the diffusion process is identified and documented.  There are four steps to innovation diffusion:

1. The adoption process identifies the need for innovation or change (Bouman, et al., 2005, p. 58).  Adoption includes information gathering and team building.

2. The implementation process puts a plan into action.  The broad approach identifies the whole diffusion process, adoption through effects, as a single implementation process (Bouman, et al., 2005, p. 92).

3. The users process identifies stakeholders.  Users can include individuals, groups, and organizations (Bouman, et al., 2005, p. 94).   For example, individuals use personal devices, and the organization uses BYOD policy.

4. The effects process examines the complete diffusion process.  Analysis provides aggregated results based on process observations.  Results can be expressed as qualitative generalizations or quantitative statistics (Bouman, et al., 2005, p. 117).
General Risk Management.  Network risk management is a loss control process.  Risk management is designed to assist decision makers:

1. Identify company assets (White, 2011, pp. 482).  Assets are company resources that are vulnerable from threats (White, 2011, p. 482).

2. Identify network threats (White, 2011, p. 482).  Threats are anything that causes harm to a company asset (White, 2011, p. 482).  NIST publishes a comprehensive list of threat events (NIST, 2012).

3. Identify system vulnerabilities (White, 2011, p. 482).  Vulnerabilities, are root conditions that exposes assets to harm (White, 2011, p. 482).  NIST publishes a comprehensive list of vulnerabilities (NIST, 2012).

4. Estimate the likelihood of an exploit (White, 2011, p. 482).  Likelihood estimates the probability that a threat will exploit a vulnerability (i.e., compromise the production servers) (White, 2011, p. 483).  Likelihood is determined with a risk assessment matrix.

5. Estimate the impact from a harmful event (White, 2011, p. 483).  Impact estimates the loss experienced from a vulnerability that is exploited by a threat (White, 2011, p. 483).  NIST publishes a comprehensive list of adverse impacts (NIST, 2012).

6. Estimate risk through a qualitative risk management matrix.

     Risk is estimated by multiplying vulnerability, impact, and likelihood:  R = V x I x L (Brock, 1999).  The assessment formula is calculated with the risk assessment matrix (Table 2).  The assessment team determines the risk matrix likelihood values.  Choosing the likelihood values requires majority quorum.  The assessment team assigns one risk value to each vulnerability: (a) high risk, (b) medium risk, (c) or low risk.

Organizational Design.

     The Star Model for Decision Making is an organizational design.  The Star Model outlines the problem in common language, forces designs based on long-term goals, and provides decision makers a series of understandable choices (Kates & Gakbraith, 2007, p. 2).  The approach begins by identifying the strategic goal.  Proceeding steps outline the goal’s structure, processes, incentives, and people.  The Star Model asks five main questions:  (a) What is being done?  (b) Who is doing it?  (c) Why are they doing it? (d) How are they doing it?  And, (d) should it be done? (Figure 1)  (Malone, Laubacher, & Dellarocas, 2010).

Figure 1.  Star Methodology outline.

     This literature review concludes organizations will benefit from a network risk assessment process.  The recommendation is based on (a) the historical developments in technology; (b) examination of potential benefits and risks; and (c) BYOD methodology processes.

     History.  The use of personal technology in the workplace is a modern phenomenon.  Personal devices are possible because of recent innovations of power efficiencies and bandwidth.  BYOD is prevalent as a results from technology influencing use.

Benefits and risks.  Mobile personal devices are common tools.  Analysis indicates that organizations can benefit from financial, efficiency, and productivity gains.  On the other hand, personal devices can introduce threats to vulnerable system resources.

Methodology Processes.  There are various methodology processes that can assist organizations assess the potential benefits and risks introduced from mobile personal devices.

Chapter III:  Methodology

     The infrastructure goal states that production servers must be available to customers. The network has a successful record for continuous operations.  To date, customers have not experienced major disruptions of services.  Previous successes may be attributed to the collective knowledge and experience of the organization's ICT staff.  In any case, conjectural mitigation is not a prudent strategy.  New security controls are required because employees connect their personal devices to the company network.  Consequently, network threats may manifest as smart devices connect to the corporate network.

     The organization employs a sophisticated network but its mitigation resources are mostly undocumented.  Existing network security processes are unproven propositions because they are based on incomplete information.  Unfounded assumptions, “can lead to broken, misconfigured, or bypassed security mechanisms” (Cisco Press, 2010).  An effective network assessment allows companies to make informed decisions.

Methodology Overview

     This study seeks to align the use of employee personal technology with business strategy.  Methodology provides the processes, assessments, and analysis necessary to determine if technology management facilitates company goals.  It proposes a synthesized methodology, the ICT Risk Assessment Model (IRAM) which provides an in-depth understanding of BYOD policy through a process of systematic planning.  The IRAM model is based on three ICT principles of (a) innovation diffusion, (b) general risk management, and (c) organizational design (Figure 2).  Each principle uniquely contributes to the IRAM methodology goal.  Innovation diffusion provides IRAM with a framework through four diffusion phases.  Risk management identifies risk conditions and uses a qualitative assessment for evaluation.  Organizational design introduces a logical and straightforward interpretation.  Decision makers will benefit from a pithy interpretation.  


ICT Diffusion

     Innovation diffusion is the first phase of the IRAM methodology process.    Each step of the innovation diffusion process, (i.e., adoption, implementation, use, and effects) is documented:

1. This study identifies BYOD policy as the candidate for change within the organization.  Team participants will include those most familiar with network operations; system administrators and management.

2. This study uses a narrow interpretation of implementation and emphasizes the design and development.  The focal point for this implementation phase centers on the risk management assessment.

3. This study identifies users as stakeholders.

4. This study takes a narrow interpretation of effects and defers specific analysis to the IRAM organizational design process.  The completed analysis will determine if BYOD policy aligns with company goals.

Risk Management

     Risk management is the second phase of the IRAM methodology process.  Data attributes are identified and applied to the risk assessment.  Likelihood and impact are calculated by proxy of risk assessment:

1. This study identifies the production servers as the primary assets.

2. This study uses a broad interpretation of threats, and identifies four potential events: (a) changing data, (b) deleting data, (c) stealing data, and (d) disruption of services.  Future research may include a narrow scope for threat identification:  For example, viruses, Trojan Horses, worms, and Denial of Service (DoS) attacks.

3. This study uses a broad interpretation of vulnerabilities, and identifies four potential conditions:  (a) infrastructure design, (b) applications, (c) operations, and (d) people.  Future research may include a narrow scope of vulnerabilities:  For example, firewalls, custom macros, policies and procedures, and accidents.

4. Likelihood is expressed in qualitative format during the risk assessment.

5. This study uses a broad interpretation of impact and identifies three potential conditions:  (a) data confidentiality, (b) data integrity, and (c) data availability.  Future research may include a narrow scope of impact:  financial losses, customer losses, etc…

6. The Network assessment team identifies risk using the risk assessment matrix (Table 2).

Organizational Design

     The Star Model for Decision Making encapsulates IRAM methodology within a simple framework.  Star Model questions are framed according to the project scope.  The results formalize the IRAM methodology into two formats: (a) pithy report, and (b) tabular reference (Table 3).

IRAM Methodology

1. What is the goal?  Data integrity, confidently, and reliability are at risk from the combination of vulnerabilities and threats.  The goal is to reduce or prevent the likelihood of production server exploitations.  The IRAM goal aligns with the adoption process of diffusion because an innovation has been identified.

2. Who is at risk?  The organization stakeholders are at risk from vulnerabilities and threats.  The stakeholders are the production processes, data, and systems.  Stakeholders are participants in the usage process of diffusion.

3. Why are the production systems at risk?  Production servers are vulnerable from a wide scope of interactions with infrastructure, applications, operations, and people.  Vulnerabilities are risk conditions that source from the implementation process of diffusion.

4. How are the production servers at risk?  Circumstances and events can harm production servers with threats of data changes, data theft, data disruption, and data destruction.  Threats are closely related to vulnerabilities, and both components align with the implementation phase of the diffusion process.

5. Should the risk be mitigated?  The IRAM risk assessment matrix estimates the effects and likelihood for vulnerabilities.  Network operators will use the assessment to determine whether controls are needed to mitigate the potential impact from risks.  Risk assessments align with the diffusion process of effects.

Data Analysis

Decision makers can use the IRAM methodology process to help determine if BYOD is appropriate for their organization.  System areas that denote high risk require mitigation.  Medium risk deserves substantial consideration.  Mitigation may be optional for low risk areas.

     This study recommends a detailed qualitative mitigation assessment for systems that require mitigation.  Qualitative mitigation assessments assign monetary values for assets (i.e., production servers) and mitigation processes (i.e., firewalls, anti-virus software, etc…). Ultimately, organizations must decide if the benefits of BYOD is worth the potential risks.


Barnes, N. M. (2013, September 26). BYOD: balancing employee privacy concerns against employer security needs. Retrieved from Association of Corporate Counsel:
Bouwman, H., Dijk, J. van, Hooff, B. van den, and Wijngaert, L. van de (2005). Information & Communication Technology in Organizations. London:  SAGE Publications.
Brynjolfsson, E. (2003, July). The IT Productivity Gap. Optimize Magazine (21). Retrieved from
BusinessKorea. (2013, November 22). Reason for Increasing Recalls. Seoul, Korea. Retrieved from
Carr, N. (2008). The Big Switch. New York: W. W. Norton & Company, Inc.
Chen, B. X. (2013, May 1st). Cellphone Thefts Grow, but the Industry Looks the Other Way. New York Times, p. A1. Retrieved from
Cisco. (2010). 6.4.3 Wireless Security Solutions. In Cisco, CCNA Security Course Booklet (p. 180). Indianapolis, IN: Cisco Press.
Cisco. (2012). BYOD and Virtualization Survey Report. Indianapolis: Cisco IBSG. Retrieved from
Cisco. (2012, October 16). Digital Subscriber Lines. Retrieved from Cisco Systems, Inc.:
Craig-Wood, K. (2012, April 26). Energy-efficient cloud computing: Jevons Paradox vs. Moore’s Law. Retrieved from Mesmet Blog:
Donohue, D., & Stewart, B. (2010). Campus Network Security. In CCNP Routing and Switching Quick Reference (p. 191). Indianapolis, IN.: Cisco Press.
Feng, W.-c. (2003, October 1). Making a Case for Efficient Supercomputing. Queue - Power Management, 1(7), p. 54. doi:
File, T. (2013). Computer and Internet Use in the United States. Washington DC: U.S. Census P20-569. Retrieved from
Fortinet. (2013, October). Fortinet Internet Security Census 2013. Retrieved from
Froom, R., Sivaasubramanian, B., & Frahim, E. (2010). Implementing Cisco IP Switched Networks (SWITCH). Indianapolis: Cisco Press.
Gambling, W. A. (2000, Nov-Dec). The Rise and Rise of Optical Fibers. IEEE Journal on Selected Topics in Quantum Electronics, 6(6), 1077-1093. doi: 10.1109/2944.902157
Glanz, J. (2012, September 22). The Cloud Factories: Power, Pollution and the Internet. Retrieved from The New York Times:
Hardesty, L. (2010, January 19). Explained: The Shannon limit. Retrieved from Massachusetts Institute of Technology News:
Herman, J. (2011, September 21). Why is My Phone So Hot? Popular Mechanics. Retrieved from
Hof, R. (2011, August 15). Bring Your Own Device. Retrieved from MIT Technology Review:
Hughes, R. (2012, August 13). Allowing Bring Your Own Device with Minimal Policy or Legal Implications. Retrieved from The White House:
IEEE. (2013, December). IEEE Std 802.11. Retrieved from IEEE Standards Association:
Intel. (2013, October 5). More's Law and Intel Innovation. Retrieved from Intel:
Juniper Networks. (2012, February). 2011 Mobile Threats Report. Retrieved from Juniper Networks:
Juniper Networks. (2013). Juniper Networks Third Annual Mobile Threats Report. Retrieved from Juniper Networks:
Koomey, J. (2011, February 13). A fascinating encounter with advocates of large rebound effects. Retrieved from Jonathan G. Koomey, PHD.:
Koomey, J., Berard, S., & Sanchez, M. (2011, July-September). Implications of Historical Trends in the Electrical Efficiency of Computing. 33(3), pp. 46-53. doi:
Odom, W. (2006). Networking Basics. Indianapolis: Cisco Press.
Owen, D. (2010, December 20). Annals of Environmentalism the Efficiency Dilemma. The New Yorker, 78-79. Retrieved from
Pew Internet. (2013, October 18). Pew Internet and American Life Project. Retrieved from Tablet and E-reader Ownership Update:
Shannon, C. E. (1948, July, October). A Mathematical Theory of Communication. The Bell System Technical Journal, 27, 379-423, 623-656. Retrieved from
Standage, T. (2004, June 12). A brief history of Wi-Fi. The Economist. Retrieved from
Troianovski, A. (2012, April 3). Optical Delusion? Fiber Booms Again, Despite Bust. Retrieved from The Wall Street Journal:
White, G. (2011). Security+ Certification. In G. White, Security+ Certification (pp. 477-4994). Emeryville: McGraw-Hill.

SMB2 PowerPoint Artifact

Artifact: Evaluate and use ICTs appropriate to one's own career.

CCNP Artifact Validation

Demonstrate command of advanced routing and switching.

   This artifact demonstrates proficiency of advanced routing and switching skills.

   Cisco Certified Network Professional (CCNP) certification validates the ability to design, implement, verify and troubleshoot local and wide-area enterprise networks (Cisco, 2013). 
Disciplines include:
  • Routing protocols. 
  • EIGRP 
  • OSPF 
  • BGP 
  • Switching architecture. 
  • Inter-VLAN routing. 
  • Spanning Tree. 
  • High availability (e.g., HSRP, VRRP, GLBP). 
  • Load balancing (e.g., EtherChannel). 
Cisco offers multiple levels of network certification: 
  •  Cisco Certified Entry Network Technician (CCENT). 
  • Cisco Certified Network Associate (CCNA). 
  • Cisco Certified Network Professional (CCNP). 
  • Cisco Certified Internetwork Expert (CCIE). 
   CCNA certification is as a prerequisite for the CCNP certification.

   The CCNP certification process consists of three proctored exams: 
  • 642-902:  Implementing Cisco IP Routing (ROUTE) 
  • 642-813:  Implementing Cisco IP Switched Network (SWITCH) 
  • 642-832:  Troubleshooting and Maintaining Cisco IP Networks (TSHOOT). 
   The entire certification process took one year to complete.  I achieved the CCNP certification through a series of lectures, discussions, course materials and extensive lab work.    

   Every systems administrator should understand routing and switching.  Networking fundamentals provide the foundations for all other network systems Cisco Certified Network Professional skill-sets are applicable to the entire infrastructure (e.g., Microsoft, Linux, etc..).  Additionally, network administrators with Cisco backgrounds should be capable of working with most other brands of networking equipment (e.g., Juniper, Fortinet, etc..).  


Cisco, 2013.  CCNP Overview.  Retrieved December, 2013,  from Cisco Systems, Inc. :  

CCNA Security Artifact Validation

Promote Enterprise Network Security Strategies. 

This artifact acknowledges that I have met the training standard for Information Systems Security Professionals, set forth by the National Secuirty Agency (NSA) and the Committee on National Security Systems (CNSS).

The Cisco Certified Network Associate Security (CCNA Security) validates my knowledge and ability to secure enterprise networks.

CCNA Security curriculum outlines infrastructure security, as follows:  firewall installation, monitoring and troubleshooting; integrity, confidentiality and data availability.

UW-Stout participates with the Cisco Networking Academy.  I achieved the CCNA Security certification through a series of lectures, discussions, course manuals, and extensive lab work.

Cryptography and encryption technologies are integrated with every infrastructure system at my workplace, including:
  • Internal certificate authority (CA) servers distributes certificates to internal systems.
  • Workstations use certificates to authenticate with a process similar to user authentication.
  • Secure socket tunneling protocol (SSTP) virtual private networks (VPNs) allows remote access.
  • Microsoft Direct Access and Terminal Services Gateway use public key infrastructure (PKI) certificates to support remote access.
  • BranchCache uses hashes to ensure data integrity.   

WAN File Services Artifact

Interpret and conduct research to improve the body of knowledge relating to ICT.

This artifact investigates a network file service problem.   End users complained of slow file browsing, slow file enumeration, and a random inability to save Microsoft Word files from a branch office.  ICT methodology determined that the problem resulted from server message block (SMB) network protocol limitations.   Recommendations were made to resolve the issues.

This artifact explores advanced SMB protocols and ICT methodology.  Additionally, it explores numerous WAN technologies: wide area file systems (WAFS); distributed file services (DFS); DFS replication (DFSR); and Microsoft BranchCache.

Legacy SMB protocol was singled out from a series of network tests.  Data statistics were gathered with network latency, bandwidth, and performance tests.

SMB2 was considered the enhanced protocol at the time the research was conducted.  SMB2 was followed by SMB 2.1 and SMB 3.0.  Microsoft released SMB 3.1, along with Windows 8.1 on October 17th, 2013.

SMB 3.1 provides file service innovations to any organization.  SMB advancements help organizations as follows: reduceds CPU workloads; reduces disruptions to shared resources; protocol encryption prevents eavesdropping; improved response times to branch offices, etc... (Microsoft, 2013).

SMB protocol is only one of the many innovations introduced by Windows 8.1 and Windows 2012R2.  ICT methodology ensures systems are ready for upgrades through careful analysis of the adoption, implementation, development and use phases.  


Microsoft, 2012.  Server Message Block Overview.  Retrieved from TechNet:  

Review and System Analysis Validation

Analyze the philosophy and principles underlying the organization and operation of ICT enterprises.

This artifact explores ICT philosophy and principles through an interview conducted with Tim Hapeman, IT Director at Oconomowoc Residential Programs (ORP).   

ORP provides group homes, work opportunities, and educational services for people with mental disabilities.  They are a $100 Million dollar company and have locations across the Midwest.  The IT department services over 100 locations and provides network services for over 2000 employees

Hapeman has been with ORP for ywo years.  He previously worked for Goodwill Industries, as the Manager of Information Technology, and Leprino Foods, as their System and Security Supervisor.  Hapeman has a bachelor in Mathematics from Michigan State University, as well as a graduate degree in Computer Information Technology from Regis University in Denver, Colorado.

Peter A. High's, World Class IT, argued that businesses need successful IT departments in order to succeed.   High outlined five principles that align IT with business strategy:

  1. Talent.  Recruit, train, and retain talented staff.  
  2.  Infrastructure.  Build and maintain robust IT systems.  
  3. Project Management.  Systematic planning and implementation ensure success. 
  4. IT and Business Partnerships.  Develop teamwork and communication between departments.  
  5. External Partnerships.  Collaboration with vendors, customers, and consultants. 
ICT diffusion principles are applied throughout the interview process.  The adoption phase consists of information gathering, design, and development.  The process begins with an analysis of High's World Class IT.  The interview questions are designed from modeling High's sub-principles of IT and business partnerships.

Artifact: Presentation on the Use of ICT

Evaluate and use ICT appropriate to IT Management.

     The validation examines Microsoft server message block network protocol (SMB2).  It represents relationships between technology, organizations, and staff.   

This validation uses an ICT innovation process  called diffusion. The four principles of  innovation diffusion are adoption, implementation, use, and effect.  This validation uses the diffusion process through the research project.

     This artifact documents an organizational problem with server message block protocol (SMB).  ICT provides a scientific approach to identify and resolve this problem. As such, it introduces SMB2 protocol innovations.

ADDIE Validation.

Plan, evaluate, and revise ICT systems.

   The artifact presents the full process management for the adoption, implementation, effects and use for computer based training modules (CBT).  The design introduces a web-based tour on the planning process for CBT modules.   The CBT project was designed using the ADDIE Process Model.

   ADDIE is short for:

  • Analysis
  • Design
  • Development
  • Implementation
  • Evaluation 

   ADDIE was the primary process management model used to design this computer based training module.

   ADDIE methodology is a combination of academic research and project implementation. 

  • ICT-710 requires a wide scope of research.  In depth reading and discussions provide working knowledge of the ADDIE process model
  • This example of a CBT module focuses on network security.
  • The web-based tour documents the ADDIE process model.
   The UW-Stout ICT program introduces its students to a number of business process improvement models.  Examples include ADDIE and Innovation Diffusion.  Cisco's Prepare, Plan, Design, Implement, Operate and Optimize (PPDIOO) methodology reinforces process improvement for routing and multi-layered switching projects.