Securing the "Bring Your Own Device" Policy
نویسندگان
چکیده
The number of devices (phones, tablets, smart TVs, ...) using Android OS is continuously and rapidly growing. Together with the devices, also the amount of applications and on-line application marketplaces is increasing. Unfortunately, security guarantees are not evolving concurrently and security flaws have been reported. Far from discouraging them, more and more users and organisations rely on Android even for security critical activities. The bring your own device (BYOD) paradigm confirms this trend. Indeed, it allows mobile devices to join a virtual organisation (consisting of a set of federated devices) in order to access to services and functionalities. Needless to say, the basic security support offered by Android and application markets is totally inappropriate for dealing with the security requirements involved in BYOD-like scenarios. In this work we describe a technique for guaranteeing that devices comply with a security policy. To do that, we use a type and effect system to infer behavioural models from applications implementation and we validate them against policy specification. Moreover, we define a novel approach, based on partial model checking, for partially evaluating the security policy depending on devices configurations. Finally, we present a prototype under implementation, called BYODroid, which concretely applies these techniques to secure the devices joining a virtual organisations in the BYOD style.
منابع مشابه
Bring Your Own Mobile Device (BYOD) to the Hospital: Layered Boundary Barriers and Divergent Boundary Management Strategies
This study examined how one US hospital implemented a mobile communication app to improve workplace communication. The hospital did not provide the technology, instead they asked their workers to use their own personal mobiles at work, through a permissive bring your own device to work (BYOD) policy. Using boundary theory, we conducted a constant-comparative analysis to examine the layers of bo...
متن کاملSecuring BYOD: A Study of Framing and Neutralization Effects on Mobile Device Security Policy Compliance
Because of the recent increase of mobile device adoption in the workplace, and the numerous security risks inherent in mobile device use, there is a growing need for organizations to craft mobile device security policies that will have a positive effect on employees’ intention to comply. Using prospect theory, developed by Kahneman and Tversky (1979), and the framing effects associated with thi...
متن کاملCharting Your Organization's Bring-Your-Own-Device Voyage
Organizations are increasingly adopting bring-your-own-device (BYOD) policies. CIOs, however, remain concerned about the potential threats from personal devices and applications to the control and security of organizational IT assets. Based on in-depth case studies at Cisco, Wal-Mart and the Arkansas Department of Information Systems, the full article describes a four-wave model that describes ...
متن کاملBarrier Free Internet Access: Evaluating the Cyber Security Risk Posed by the Adoption of Bring Your Own Devices to e-Learning Network Infrastructure
The adoption of Bring Your Own Device (BYOD) – also known as Bring Your Own Technology (BYOT), Bring Your Own Phone (BYOP), or Bring Your Own Personal Computer (BYOPC) – is a policy which allows people access to privileged resources, information and services available on the private computer network of an organization using their own personal computer devices. BYOD, since its emergence in 2009,...
متن کاملThe Mobile Execution Environment: a Secure and Non- Intrusive Approach to Implement a Bring Your Own Device Policy for Laptops
Bring Your Own Device (BYOD) has become an established business practice, however the practice can increase an organisation’s information security risks. The implementation of a BYOD policy for laptops must consider how the information security risks can be mitigated or managed. The selection of an appropriate secure laptop software configuration is an important part of the information security...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Internet Serv. Inf. Secur.
دوره 2 شماره
صفحات -
تاریخ انتشار 2012