Tuesday, May 5, 2020

BYOD Devices and Countermeasures †Free Samples to Students

Question: Discuss about the BYOD Devices and Countermeasures. Answer: Introduction: The research focuses on security threats and attacks with the concept of Bring Your Own Devices (BYOD) adopted by the business organizations. BYOD scheme provides the employees with the permission to bring their personal devices at work location for the execution of professional tasks and activities. There are numerous security concerns that have emerged as a result. Physical security risks, such as loss or stealing of the device are the most commonly observed threat that causes data leakage and data loss as well. Malware attacks due to poor device protection and safety is another common threat. There are internal applications installed on the personal devices of the employees with the adaptation of BYOD policy. These applications comprise of confidential and sensitive data sets. These information sets often get exposed to unauthorized entities such as employees friends or family which may be deliberate or accidental. This results in information breaches and violation of information confidentiality. The deliberate exposures by the employee are termed as insider threats (Olalere, Abdullah, Mahmod Abdullah, 2015). Connecting these devices to public or unsecure networks bring in network security threats, such as eavesdropping and man in the middle attacks. The security threats associated with BYOD can be improved with the implementation of data encryption protocols and advanced access control mechanisms. There shall be anti-malware and network-based intrusion detection tools installed in the devices to ensure that the information sets are always protected (Downer Bhattacharya, 2015). Firewalls, multi-fold authentication, device trackers and security audits are other measures that shall be utilized. References Downer, K., Bhattacharya, M. (2015). BYOD Security: A New Business Challenge. 2015 IEEE International Conference On Smart City/Socialcom/Sustaincom (Smartcity). https://dx.doi.org/10.1109/smartcity.2015.221 Olalere, M., Abdullah, M., Mahmod, R., Abdullah, A. (2015). A Review of Bring Your Own Device on Security Issues. SAGE Open, 5(2), 215824401558037. https://dx.doi.org/10.1177/2158244015580372

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.