BYOD SECURITY AND ITS POSSIBLE SOLUTIONS

  • Madhavi Dhingra
Keywords: BYOD, BYOD Security, Device Security, Security Issues, Bring Your Own Device

Abstract

BYOD (Bring your own Device) is a piece of its bigger pattern consumerization, in which purchaser programming and equipment are being brought into the undertaking. BYOT (bring your own particular innovation) alludes to the utilization of customer gadgets and applications in the workplace. A powerful BYOD procedure can prompt various advantages for organizations, including enhanced representative employment fulfillment, expanded occupation proficiency and adaptability. BYOD can likewise give cost reserve funds from starting gadget buy to on-going use and IT helpdesk bolster as representatives put resources into their own gadgets. Despite worries about Bring Your Own Device (BYOD) security dangers, representatives over the previous years have appreciated the different advantages of BYOD. So too have businesses, who are far-fetched ever to prevent staff from conveying their own particular gadgets to work or utilizing them remotely for work purposes. The test stays to distinguish security dangers related with BYOD and locate the most fitting answers for alleviate these risks. By recognizing potential dangers, the framework can settle on an astute choice in the matter of how to react. This paper manages the security dangers related with it and the conceivable answers for it.

                                     

Downloads

Download data is not yet available.

References

AirWatch. (2012). Enabling bring your own devices (BYOD) in the enterprise. Retrieved from http://www.ciosummits.com/media/solution_spotlight/byod-whitepaper.pdf Google Scholar

AlHarthy, K., Shawkat, W. (2013, November-December). Implement network security control solution in BYOD environment. IEEE International Conference on Control System, Computing and Engineering, Penang, Malaysia. Google Scholar, Crossref DOI: https://doi.org/10.1109/ICCSCE.2013.6719923

Armando, A., Costa, G., Merlo, A. (2013, March). Bring your own device, securely. Proceedings of the 28th annual ACM Symposium on Applied Computing, Coimbra, Portugal. Google Scholar, Crossref DOI: https://doi.org/10.1145/2480362.2480707

Ballagas, R., Rohs, M., Sheridan, J. G., Borchers, J. (2013). BYOD: Bring your own device. Retrieved from http://www.vs.inf.ethz.ch/publ/papers/rohs-byod-2004.pdf Google Scholar

Björn, N., Sebastian, K., Kevin, O., Stefan, K. (2012). Towards an IT consumerization theory: A theory and practice review. Working papers, ERCIS – European research center for information systems, no 13. Retrieved Febuary 10, 2014 from http://hdl.handle.net/10419/60246 Google Scholar

Chung, S., Chung, S., Escrig, T., Bai, Y., Endicott-Popovsky, B. (2012, December). 2TAC: Distributed access control architecture for “bring your own device” security. ASE/IEEE International Conference on Biomedical Computing, Washington, DC. Google Scholar, Crossref DOI: https://doi.org/10.1109/BioMedCom.2012.26

Cisco. (2012). BYOD: A global perspective (Survey report). Retrieved from http://www.cisco.com/web/about/ac79/docs/re/BYOD_Horizons-Global.pdf Google Scholar

Citrix®. (2013, April). Best practices to make BYOD simple and secure (White paper). Retrieved from http://www.citrix.com/content/dam/citrix/en_us/documents/oth/byod-best-practices.pdf Google Scholar

Citrix®. (2012, March). Bring your own devices (Solution brief). Retrieved from http://www.prosysis.com/wp-content/uploads/2013/06/Citrix-BYOD-Solution-Brief.pdf Google Scholar

Published
2018-02-28
How to Cite
Dhingra, M. (2018). BYOD SECURITY AND ITS POSSIBLE SOLUTIONS. International Journal of Engineering Technologies and Management Research, 5(2), 101-106. https://doi.org/10.29121/ijetmr.v5.i2.2018.620