A Review of BYOD Security Challenges, Solutions and Policy Best Practices. A Review Paper

被引:0
|
作者
Alotaibi, Bashayer [1 ]
Almagwashi, Haya [1 ]
机构
[1] King Abdulaziz Univ, Dept Informat Syst, Jeddah, Saudi Arabia
关键词
Bring Your Own Device; BYOD Security Challenges; BYOD Security Policy; BYOD Management;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, many employees' own smartphones and tablets; where they use these devices in the workplace either for personal use or to perform functional tasks. Perhaps this considered as the main motivation for numerous organization to pay attention to 'bring your own device' business trend; which is related to the use of personal devices for business purposes. For an organization, this brings some opportunities and security risks. The establish of BYOD policies always be a tough task, as an organization needs to avoid security risks and increase employee productivity. However, the associated security risks with BYOD policy can be managed by developing an effective security policy and adopt some technical security control and procedures. This research paper covers the review of current BYOD security challenges and issues, security solutions and policy best practices in organizational perspective. Moreover, a comprehensive security policy model presented and discussed.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] 5G Security Challenges and Solutions: A Review by OSI Layers
    Sullivan, S.
    Brighente, Alessandro
    Kumar, S. A. P.
    Conti, M.
    [J]. IEEE ACCESS, 2021, 9 : 116294 - 116314
  • [32] Smart Grid Cyber Security Enhancement: Challenges and Solutions-A Review
    Alsuwian, Turki
    Butt, Aiman Shahid
    Amin, Arslan Ahmed
    [J]. SUSTAINABILITY, 2022, 14 (21)
  • [33] A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions
    Sun, Li
    Du, Qinghe
    [J]. ENTROPY, 2018, 20 (10)
  • [34] Software security in agile software development: A literature review of challenges and solutions
    Riisom, Klaus Reche
    Hubel, Martin Slusarczyk
    Alradhi, Hasan Mousa
    Nielsen, Niels Bonde
    Kuusinen, Kati
    Jabangwe, Ronald
    [J]. 19TH INTERNATIONAL CONFERENCE ON AGILE SOFTWARE DEVELOPMENT (XP '18), 2018,
  • [35] Disaster Recovery on Cloud - Security Compliance Challenges and Best Practices
    Rajendran, Sreenivasan
    Sundar, Karthik
    Maini, Rajat
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2013), 2013, : 149 - 158
  • [36] Systematic Review of the Literature: Best Practices
    Gupta, Supriya
    Rajiah, Prabhakar
    Middlebrooks, Erik H.
    Baruah, Dhiraj
    Carter, Brett W.
    Burton, Kirsteen R.
    Chatterjee, Arindam Rano
    Miller, Matthew M.
    [J]. ACADEMIC RADIOLOGY, 2018, 25 (11) : 1481 - 1490
  • [37] THE BEST PRACTICES OF WARRANTY SYSTEM: A REVIEW
    Sibly, Sufardy
    Yusof, Nor'Aini
    Shafei, Mohd Wira Mohd
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL POSTGRADUATE CONFERENCE ON INFRASTRUCTURE AND ENVIRONMENT, VOL 2, 2010, : 175 - 187
  • [38] Review of Best Practices for an Environmental Laboratory
    Adams, Hunter
    Holloway, Nicole
    English, Zonetta
    Fleming, Jaime
    Wagner, Mary Carol
    Keesling, Raelene F.
    Lipps, William C.
    Hertz, Charles D.
    Consolvo, John
    Burlingame, Gary A.
    [J]. JOURNAL AWWA, 2022, 114 (09): : 42 - 55
  • [39] Review of Best Practices for an Environmental Laboratory
    Adams, Hunter
    Holloway, Nicole
    English, Zonetta
    Fleming, Jaime
    Wagner, Mary Carol
    Keesling, Raelene F.
    Lipps, William C.
    Hertz, Charles D.
    Consolvo, John
    Burlingame, Gary A.
    [J]. Journal - American Water Works Association, 2022, 114 (09): : 42 - 55
  • [40] Are Best Practices Really Best? A Review of the Best Practices Literature in Library and Information Studies
    Druery, Jackie
    McCormack, Nancy
    Murphy, Sharon
    [J]. EVIDENCE BASED LIBRARY AND INFORMATION PRACTICE, 2013, 8 (04): : 110 - 128