An efficient security analysis of bring your own device

P. Soubhagyalakshmi, K. Reddy
{"title":"An efficient security analysis of bring your own device","authors":"P. Soubhagyalakshmi, K. Reddy","doi":"10.11591/ijai.v12.i2.pp696-703","DOIUrl":null,"url":null,"abstract":"The significant enhancement in demand for bring your own device (BYOD) mechanism in several organizations has sought the attention of several researchers in recent years. However, the utilization of BYOD comes with a high risk of losing crucial information due to lesser organizational control on employee-owned devices. The purpose of this article is to review and analyze the various security threats in BYOD; further we review the existing work that was developed in order to reduce the risks present in BYOD. A detailed review is presented to detect BYOD security threats and their respective security policies. A phase-by-phase mitigation strategy is developed based on the components and crucial elements identified using review policy. Managerial-level, social-level and technical level issues are identified such as illegal access, leaking delicate company data, lower flexibility, corporate data breaching, and employee privacy. It is analyzed that collaboration of people, security policy factors and technology in an effective manner can mitigate security threats present in the BYOD mechanism. This article initiates a move towards filling the security gap present the BYOD mechanism. This article can be utilized for providing guidelines in various organizations. Ultimately, successful implementation of BYOD depends upon the balance created between usability and security.","PeriodicalId":52221,"journal":{"name":"IAES International Journal of Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IAES International Journal of Artificial Intelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.11591/ijai.v12.i2.pp696-703","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Decision Sciences","Score":null,"Total":0}
引用次数: 1

Abstract

The significant enhancement in demand for bring your own device (BYOD) mechanism in several organizations has sought the attention of several researchers in recent years. However, the utilization of BYOD comes with a high risk of losing crucial information due to lesser organizational control on employee-owned devices. The purpose of this article is to review and analyze the various security threats in BYOD; further we review the existing work that was developed in order to reduce the risks present in BYOD. A detailed review is presented to detect BYOD security threats and their respective security policies. A phase-by-phase mitigation strategy is developed based on the components and crucial elements identified using review policy. Managerial-level, social-level and technical level issues are identified such as illegal access, leaking delicate company data, lower flexibility, corporate data breaching, and employee privacy. It is analyzed that collaboration of people, security policy factors and technology in an effective manner can mitigate security threats present in the BYOD mechanism. This article initiates a move towards filling the security gap present the BYOD mechanism. This article can be utilized for providing guidelines in various organizations. Ultimately, successful implementation of BYOD depends upon the balance created between usability and security.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一个有效的安全分析带来自己的设备
近年来,一些组织对自带设备(BYOD)机制的需求显著增加,引起了一些研究人员的注意。然而,由于组织对员工拥有的设备的控制较少,BYOD的使用带来了丢失关键信息的高风险。本文的目的是回顾和分析BYOD中的各种安全威胁;我们进一步回顾了为降低BYOD中存在的风险而开发的现有工作。详细介绍了BYOD安全威胁检测及其各自的安全策略。根据审查政策确定的组成部分和关键要素,制定了分阶段缓解战略。发现了管理层、社会层和技术层的问题,如非法访问、泄露敏感的公司数据、灵活性降低、公司数据泄露和员工隐私。分析了人、安全策略因素和技术的有效协作可以缓解BYOD机制中存在的安全威胁。本文提出了BYOD机制来填补安全漏洞。本文可用于提供各种组织中的指导方针。最终,BYOD的成功实现取决于可用性和安全性之间的平衡。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IAES International Journal of Artificial Intelligence
IAES International Journal of Artificial Intelligence Decision Sciences-Information Systems and Management
CiteScore
3.90
自引率
0.00%
发文量
170
期刊最新文献
Traffic light counter detection comparison using you only look oncev3 and you only look oncev5 for version 3 and 5 Eligibility of village fund direct cash assistance recipients using artificial neural network Reducing the time needed to solve a traveling salesman problem by clustering with a Hierarchy-based algorithm Glove based wearable devices for sign language-GloSign Hybrid travel time estimation model for public transit buses using limited datasets
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1