Development Of A New Security Framework For Bring Your Own Device

Bring your own device (B)'OD) concept is a recent and growing trend in most organizations, where employees are allowed to access the organization's network using their own devices. It has important features which provide convenience and ease of use to employees, while the organizations...

Full description

Saved in:
Bibliographic Details
Main Author: Sanaa Abdoussalam Ammar Ennajeh
Format: Thesis
Language:English
Subjects:
Online Access:https://oarep.usim.edu.my/bitstreams/c7411323-908d-4ea1-b188-5625e20c694d/download
https://oarep.usim.edu.my/bitstreams/e4e387e9-b204-45dd-8cc6-1c3646d60bd5/download
https://oarep.usim.edu.my/bitstreams/ad0b5590-5c05-4cf9-8127-4ee69eba3e0c/download
https://oarep.usim.edu.my/bitstreams/63b03643-fd7c-46ac-bd9d-b75efa30b2b1/download
https://oarep.usim.edu.my/bitstreams/93132f4d-48bf-4c5e-9039-5026b98a17e2/download
https://oarep.usim.edu.my/bitstreams/a4943b78-5d0d-4ae8-993e-caa795733c5a/download
https://oarep.usim.edu.my/bitstreams/4702afe5-4890-42f9-9286-44cb50342bbf/download
https://oarep.usim.edu.my/bitstreams/601c65e9-28bd-4bb0-8af4-b70589a38382/download
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Bring your own device (B)'OD) concept is a recent and growing trend in most organizations, where employees are allowed to access the organization's network using their own devices. It has important features which provide convenience and ease of use to employees, while the organizations allow their employees to be as productive as possible. On the other hand. organizations may save the costs of purchasing and maintaining such assets. However, allowing personal mobile devices to access the organization network may carry security risks in the organizations and increase the chances of' cvber attacks. It is difficult to trust these devices with access to specific proprietary information. Although many researchers have developed several models for security policies for BYOD, these policies adopted in most organizations are vague and generally immature. Thus, this research proposes the security framework for BYOD as a solution that enhances the security in organization without compromising the usability and flexibility of the system. The methods used in this research are systematic literature review and qualitative research approach. Systematic literature review method was chosen in this research to address the current state of security policies that is needed to secure BYOD. While the qualitative method is used to evaluate BYOD security framework. The proposed framework uses two layers of security controls which are device control and BYOD server. By this framework the organizations can reduce the emerging attacks of using mobile devices and increase the level of security.