...
首页> 外文期刊>IAES International Journal of Artificial Intelligence >An efficient security analysis of bring your own device
【24h】

An efficient security analysis of bring your own device

机译:

获取原文
获取原文并翻译 | 示例
           

摘要

The significant enhancement in demand for bring your own device (BYOD) mechanism in several organizations has sought the attention of several researchers in recent years. However, the utilization of BYOD comes with a high risk of losing crucial information due to lesser organizational control on employee-owned devices. The purpose of this article is to review and analyze the various security threats in BYOD; further we review the existing work that was developed in order to reduce the risks present in BYOD. A detailed review is presented to detect BYOD security threats and their respective security policies. A phase-by-phase mitigation strategy is developed based on the components and crucial elements identified using review policy. Managerial-level, social-level and technical level issues are identified such as illegal access, leaking delicate company data, lower flexibility, corporate data breaching, and employee privacy. It is analyzed that collaboration of people, security policy factors and technology in an effective manner can mitigate security threats present in the BYOD mechanism. This article initiates a move towards filling the security gap present the BYOD mechanism. This article can be utilized for providing guidelines in various organizations. Ultimately, successful implementation of BYOD depends upon the balance created between usability and security. © 2023, Institute of Advanced Engineering and Science. All rights reserved.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号