BYOD SECURITY AND ITS POSSIBLE SOLUTIONS
Keywords:BYOD, BYOD Security, Device Security, Security Issues, Bring Your Own Device
BYOD (Bring your own Device) is a piece of its bigger pattern consumerization, in which purchaser programming and equipment are being brought into the undertaking. BYOT (bring your own particular innovation) alludes to the utilization of customer gadgets and applications in the workplace. A powerful BYOD procedure can prompt various advantages for organizations, including enhanced representative employment fulfillment, expanded occupation proficiency and adaptability. BYOD can likewise give cost reserve funds from starting gadget buy to on-going use and IT helpdesk bolster as representatives put resources into their own gadgets. Despite worries about Bring Your Own Device (BYOD) security dangers, representatives over the previous years have appreciated the different advantages of BYOD. So too have businesses, who are far-fetched ever to prevent staff from conveying their own particular gadgets to work or utilizing them remotely for work purposes. The test stays to distinguish security dangers related with BYOD and locate the most fitting answers for alleviate these risks. By recognizing potential dangers, the framework can settle on an astute choice in the matter of how to react. This paper manages the security dangers related with it and the conceivable answers for it.
AirWatch. (2012). Enabling bring your own devices (BYOD) in the enterprise. Retrieved from http://www.ciosummits.com/media/solution_spotlight/byod-whitepaper.pdf Google Scholar
AlHarthy, K., Shawkat, W. (2013, November-December). Implement network security control solution in BYOD environment. IEEE International Conference on Control System, Computing and Engineering, Penang, Malaysia. Google Scholar, Crossref DOI: https://doi.org/10.1109/ICCSCE.2013.6719923
Armando, A., Costa, G., Merlo, A. (2013, March). Bring your own device, securely. Proceedings of the 28th annual ACM Symposium on Applied Computing, Coimbra, Portugal. Google Scholar, Crossref DOI: https://doi.org/10.1145/2480362.2480707
Ballagas, R., Rohs, M., Sheridan, J. G., Borchers, J. (2013). BYOD: Bring your own device. Retrieved from http://www.vs.inf.ethz.ch/publ/papers/rohs-byod-2004.pdf Google Scholar
Björn, N., Sebastian, K., Kevin, O., Stefan, K. (2012). Towards an IT consumerization theory: A theory and practice review. Working papers, ERCIS – European research center for information systems, no 13. Retrieved Febuary 10, 2014 from http://hdl.handle.net/10419/60246 Google Scholar
Chung, S., Chung, S., Escrig, T., Bai, Y., Endicott-Popovsky, B. (2012, December). 2TAC: Distributed access control architecture for “bring your own device” security. ASE/IEEE International Conference on Biomedical Computing, Washington, DC. Google Scholar, Crossref DOI: https://doi.org/10.1109/BioMedCom.2012.26
Cisco. (2012). BYOD: A global perspective (Survey report). Retrieved from http://www.cisco.com/web/about/ac79/docs/re/BYOD_Horizons-Global.pdf Google Scholar
Citrix®. (2013, April). Best practices to make BYOD simple and secure (White paper). Retrieved from http://www.citrix.com/content/dam/citrix/en_us/documents/oth/byod-best-practices.pdf Google Scholar
Citrix®. (2012, March). Bring your own devices (Solution brief). Retrieved from http://www.prosysis.com/wp-content/uploads/2013/06/Citrix-BYOD-Solution-Brief.pdf Google Scholar
How to Cite
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- The work described has not been formally published before, except in the form of an abstract or as part of a published lecture, review, thesis, or overlay journal.
- That it is not under consideration for publication elsewhere.
- That its release has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Authors who publish with International Journal of Engineering Technologies and Management Research agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or edit it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
For More info, please visit CopyRight Section