Development Of A New Security Framework For Bring Your Own Device

Bring your own device (B)'OD) concept is a recent and growing trend in most organizations, where employees are allowed to access the organization's network using their own devices. It has important features which provide convenience and ease of use to employees, while the organizations...

全面介绍

Saved in:
书目详细资料
主要作者: Sanaa Abdoussalam Ammar Ennajeh
格式: Thesis
语言:English
主题:
在线阅读:https://oarep.usim.edu.my/bitstreams/c7411323-908d-4ea1-b188-5625e20c694d/download
https://oarep.usim.edu.my/bitstreams/e4e387e9-b204-45dd-8cc6-1c3646d60bd5/download
https://oarep.usim.edu.my/bitstreams/ad0b5590-5c05-4cf9-8127-4ee69eba3e0c/download
https://oarep.usim.edu.my/bitstreams/63b03643-fd7c-46ac-bd9d-b75efa30b2b1/download
https://oarep.usim.edu.my/bitstreams/93132f4d-48bf-4c5e-9039-5026b98a17e2/download
https://oarep.usim.edu.my/bitstreams/a4943b78-5d0d-4ae8-993e-caa795733c5a/download
https://oarep.usim.edu.my/bitstreams/4702afe5-4890-42f9-9286-44cb50342bbf/download
https://oarep.usim.edu.my/bitstreams/601c65e9-28bd-4bb0-8af4-b70589a38382/download
标签: 添加标签
没有标签, 成为第一个标记此记录!
实物特征
总结:Bring your own device (B)'OD) concept is a recent and growing trend in most organizations, where employees are allowed to access the organization's network using their own devices. It has important features which provide convenience and ease of use to employees, while the organizations allow their employees to be as productive as possible. On the other hand. organizations may save the costs of purchasing and maintaining such assets. However, allowing personal mobile devices to access the organization network may carry security risks in the organizations and increase the chances of' cvber attacks. It is difficult to trust these devices with access to specific proprietary information. Although many researchers have developed several models for security policies for BYOD, these policies adopted in most organizations are vague and generally immature. Thus, this research proposes the security framework for BYOD as a solution that enhances the security in organization without compromising the usability and flexibility of the system. The methods used in this research are systematic literature review and qualitative research approach. Systematic literature review method was chosen in this research to address the current state of security policies that is needed to secure BYOD. While the qualitative method is used to evaluate BYOD security framework. The proposed framework uses two layers of security controls which are device control and BYOD server. By this framework the organizations can reduce the emerging attacks of using mobile devices and increase the level of security.