Exploring Security Theory Approach in BYOD Environment

  • Deepak SangrohaEmail author
  • Vishal Gupta
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 28)


BYOD (Bring Your Own Device) is a business policy to allow employees to bring their own devices at their work. The employee uses the same device in and out of the corporate office and during outside use, it may be connected to insecure internet and critical corporate data become public or when a device is used in an insecure environment, it may get infected by big threats and they may get activated when the device is used in organization’s environment and may harm the confidential information. In both cases the organization will be in losing side because if internal data become public it may hurt business strategies and future policies. If internal organization gets infected from outside attack, it will certainly hurt the business in any way. In this paper we are suggesting some approaches which can guard against these types of threat and secure the corporate data.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    BYOD: On-boarding and Securing Devices in Your Corporate network. MotorolaGoogle Scholar
  2. 2.
    Emery, S.: Factors for consideration when developing a bring your own device (BYOD)Google Scholar
  3. 3.
    Capstone Report at California College of the Arts (2012)Google Scholar
  4. 4.
    Bring Your Own Device. MTI TechnologiesGoogle Scholar
  5. 5.
    Anderson, N.: Cisco Bring Your Own Device. Cisco (2012)Google Scholar
  6. 6.
    Kneller, D.: Bring Your Own Device. Madgwicks (2013)Google Scholar
  7. 7.
    Hidden risk of Bring Your Own Device Mobility Model. ProfitlineGoogle Scholar
  8. 8.
    Holistic, A.: approach to BYOD security and Management. HP (2012)Google Scholar
  9. 9.
    Smartphones and Tablets in the Enterprise. Enterasys Secure NetworksGoogle Scholar
  10. 10.
    Selecting the right mobile device management solution. Wavelink (2011)Google Scholar
  11. 11.
    Gupta, V., Dhiman, L., Sangroha, D.: An approach to implement Bring Your Own Device (BYOD) Securely. International Journal of Engineering Innovation and Research (2013)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of Computer ScienceAIACT&RDelhiIndia

Personalised recommendations