An efficient security analysis of bring your own device

نویسندگان

چکیده

The significant enhancement in demand for bring your own device (BYOD) mechanism several organizations has sought the attention of researchers recent years. However, utilization BYOD comes with a high risk losing crucial information due to lesser organizational control on employee-owned devices. purpose this article is review and analyze various security threats BYOD; further we existing work that was developed order reduce risks present BYOD. A detailed presented detect their respective policies. phase-by-phase mitigation strategy based components elements identified using policy. Managerial-level, social-level technical level issues are such as illegal access, leaking delicate company data, lower flexibility, corporate data breaching, employee privacy. It analyzed collaboration people, policy factors technology an effective manner can mitigate mechanism. This initiates move towards filling gap be utilized providing guidelines organizations. Ultimately, successful implementation depends upon balance created between usability security.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BYOD: Bring Your Own Device

In this work, we examine the different types of user interactions and deployment issues surrounding large public displays. We then select and develop a usage paradigm in which people use personal devices to interact with large public displays. Lastly, we present a physical interface for interacting with large public displays based on camera-enabled mobile phones. Our interface uses both Visual ...

متن کامل

Bring Your Own Device Organisational Information Security and Privacy

BYOD is a growing trend in corporate environments, where employees bring their own devices to work. Factors that have led to the growing popularity of BYOD include the benefits of work flexibility, increased productivity, and efficiency of employees. Despite these benefits, there are concerns over information security and privacy. Since BYOD allows employees to access organisational data anytim...

متن کامل

Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security

An emerging trend in corporate network administration is BYOD (Bring Your Own Device). Although with many advantages, the paradigm shift presents new challenges in security to enterprise networks. While existing solutions such as Mobile Device Management (MDM) focus mainly on controlling and protecting device data, they fall short in providing a holistic network protection system. New innovatio...

متن کامل

Securing the "Bring Your Own Device" Policy

The number of devices (phones, tablets, smart TVs, ...) using Android OS is continuously and rapidly growing. Together with the devices, also the amount of applications and on-line application marketplaces is increasing. Unfortunately, security guarantees are not evolving concurrently and security flaws have been reported. Far from discouraging them, more and more users and organisations rely o...

متن کامل

Bring Your Own Device (byod) Adoption

Bring Your Own Device (BYOD) policies permit employees to use personal devices to access organizational information. Users gain convenience from the ability to work in geographically diverse locations, while organizations gain the benefit of increased productivity and reduced information technology expense. However, these symbiotic benefits come at a cost. Organizations’ security boundaries are...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IAES International Journal of Artificial Intelligence

سال: 2023

ISSN: ['2089-4872', '2252-8938']

DOI: https://doi.org/10.11591/ijai.v12.i2.pp696-703