Exploring Security Theory Approach in BYOD Environment
BYOD (Bring Your Own Device) is a business policy to allow employees to bring their own devices at their work. The employee uses the same device in and out of the corporate office and during outside use, it may be connected to insecure internet and critical corporate data become public or when a device is used in an insecure environment, it may get infected by big threats and they may get activated when the device is used in organization’s environment and may harm the confidential information. In both cases the organization will be in losing side because if internal data become public it may hurt business strategies and future policies. If internal organization gets infected from outside attack, it will certainly hurt the business in any way. In this paper we are suggesting some approaches which can guard against these types of threat and secure the corporate data.
Unable to display preview. Download preview PDF.
- 1.BYOD: On-boarding and Securing Devices in Your Corporate network. MotorolaGoogle Scholar
- 2.Emery, S.: Factors for consideration when developing a bring your own device (BYOD)Google Scholar
- 3.Capstone Report at California College of the Arts (2012)Google Scholar
- 4.Bring Your Own Device. MTI TechnologiesGoogle Scholar
- 5.Anderson, N.: Cisco Bring Your Own Device. Cisco (2012)Google Scholar
- 6.Kneller, D.: Bring Your Own Device. Madgwicks (2013)Google Scholar
- 7.Hidden risk of Bring Your Own Device Mobility Model. ProfitlineGoogle Scholar
- 8.Holistic, A.: approach to BYOD security and Management. HP (2012)Google Scholar
- 9.Smartphones and Tablets in the Enterprise. Enterasys Secure NetworksGoogle Scholar
- 10.Selecting the right mobile device management solution. Wavelink (2011)Google Scholar
- 11.Gupta, V., Dhiman, L., Sangroha, D.: An approach to implement Bring Your Own Device (BYOD) Securely. International Journal of Engineering Innovation and Research (2013)Google Scholar