Bring-Your-Own-Device (BYOD): An Evaluation of Associated Risks to Corporate Information Security

نویسندگان

  • Ezer Osei Yeboah-Boateng
  • Francis Edmund Boaten
چکیده

This study evaluates the cyber-risks to Business Information Assets posed by the adoption of Bring-YourOwn-Device (BYOD) to the workplace. BYOD is an emerging trend where employees bring and use personal computing devices on the company’s network to access applications and sensitive data like emails, calendar and scheduling applications, documents, etc. Employees are captivated by BYOD because they can have access to private items as well as perform certain job functions while being unrestricted to their desks. This is however usually done on the blind side of management or the system administrator; a situation that tends to expose vital and sensitive corporate information to various threats like unwanted network traffic, unknown applications, malwares, and viruses. Expert opinions were elicited in this exploratory study. The study evaluated the characteristics of BYOD, assessed associated risks, threats and vulnerabilities. The findings indicate that little or no security measures were instituted to mitigate risks associated with BYOD.Though, profound benefits abound with BYOD adoption, they could be eroded by security threats and costs of mitigation in curing breaches. The most significant risk was found to be Data Loss which was in consonance with similar studies on Smartphone security risks. Some mitigation measures are then recommended.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bring Your Own Device Organisational Information Security and Privacy

BYOD is a growing trend in corporate environments, where employees bring their own devices to work. Factors that have led to the growing popularity of BYOD include the benefits of work flexibility, increased productivity, and efficiency of employees. Despite these benefits, there are concerns over information security and privacy. Since BYOD allows employees to access organisational data anytim...

متن کامل

The Mobile Execution Environment: a Secure and Non- Intrusive Approach to Implement a Bring Your Own Device Policy for Laptops

Bring Your Own Device (BYOD) has become an established business practice, however the practice can increase an organisation’s information security risks. The implementation of a BYOD policy for laptops must consider how the information security risks can be mitigated or managed. The selection of an appropriate secure laptop software configuration is an important part of the information security...

متن کامل

Barrier Free Internet Access: Evaluating the Cyber Security Risk Posed by the Adoption of Bring Your Own Devices to e-Learning Network Infrastructure

The adoption of Bring Your Own Device (BYOD) – also known as Bring Your Own Technology (BYOT), Bring Your Own Phone (BYOP), or Bring Your Own Personal Computer (BYOPC) – is a policy which allows people access to privileged resources, information and services available on the private computer network of an organization using their own personal computer devices. BYOD, since its emergence in 2009,...

متن کامل

Are You Ready to Lose Control? A Theory on the Role of Trust and Risk Perception on Bring-Your-Own-Device Policy and Information System Service Quality

IT consumerization or bring-your-own-device (BYOD) behavior, i.e., the use of private devices within organizational boundaries, is steadily increasing. Despite potential benefits, organizations are struggling to keep up with this development since a variety of risks, uncertainties, and potential costs are related to the use of private devices within the enterprise. Potential negative consequenc...

متن کامل

A framework towards governing "Bring Your Own Device in SMMEs"

Information is a critically important asset that has been used for decades within organizations. Like any asset, there are threats to the information that impact processes such as; email retrieval and access to organizational system services. As a consequence of the threats, attention to the security of the information is important. Technology is utilized to secure information and the cost affi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1609.01821  شماره 

صفحات  -

تاریخ انتشار 2016