BYOD environments Security challenges - A Survey
|
International Journal of P2P Network Trends and Technology (IJPTT) | |
© 2016 by IJPTT Journal | ||
Volume - 6 Issue - 4 |
||
Year of Publication : 2016 | ||
Authors : Sanjoy Das | ||
DOI : 10.14445/22492615/IJPTT-V27P402 |
Citation
Sanjoy Das "BYOD environments Security challenges - A Survey". International Journal of P2P Network Trends and Technology (IJPTT), V6(4):4-6 Jul - Aug 2016, ISSN:2249-2615, www.ijpttjournal.org, Published by Seventh Sense Research Group.
Abstract
New mobile technologies are emerging continuously in today’s scenario. Like smartphones are used extensively for data communication as well as a processing. BYOD (Bring Your Own Device) is one such technology that has evolved in the business environment. In this environment employees of any organization can bring and use their portable devices like mobile phones, laptops, notebooks to their offices/work places. This helps in sharing, optimizing the utilization of resources. This is a futuristic approach where heterogeneous devices can join hand to work together. Users working in this environment can bring devices of different make and model, which makes it a truly heterogeneous environment. When resources of any organization need to be share among the user of unclassified devices leads to various challenging issues to organizational assets. In this survey, our focus is on security issues and various benefits associated with BYOD. As this field in very new and emerging area of research which may open lots of scope for new researchers to explore this domain for its high acceptability.
References
[1] http://www.govinfosecurity.com/webinars/mobilelearnfrom- intels-ciso-on-securing-employee-owneddevices- w-264. [accessed on 1st February 2016].
[2] http://en.wikipedia.org/wiki/Bring_your_own_device#cite_ note-6. [accessed on March 2015].
[3] https://www.forrester.com/Forrsights+Workforce+Employe e+Survey+Q2+2012/-/E-SUS1251[accessed on March 2015].
[4] http://www.appstechnews.com/news/2013/may/29/gartnerwho- are-leading-mdm-players-2013.[accessed on February 2015].
[5] Bring your own device Security and risk considerations for your mobile device program, http://www.ey.com/Publication/vwLUAssets/EYBring_your _own_device:_mobile_security_and_risk/$FILE/Bring_your _own_device.pdf .[accessed on April 2015].
[6] Prashant Kumar Gajar et al., “BRING YOUR OWN DEVICE (BYOD): SECURITY RISKS AND MITIGATING STRATEGIES”, Volume 4, No. 4, , pp.62- 70, April 2013.
[7] http://www.pcworld.com/article/246760/pros_and_cons_of_ byod_bring_your_own_device_.html [accessed on March 2015].]
[8] Kathleen Downer, Maumita Bhattacharya, “BYOD Security: A New Business Challenge”, IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity)-2015,Chengdu,19-21 Dec. 2015, pp.1128-1133.
[9] M.M. Singh et al., "SECURITY ATTACKS TAXONOMY ON BRING YOUR OWN DEVICES (BYOD)MODEL", International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 4, No.5,October 2014,pp.1- 17.
Keywords
BYOD, breached device, mobile device management, risk.