BYOD Security: Technologies, Challenges, and Future Countermeasures

Verified

Added on  2021/05/31

|11
|2834
|32
Report
AI Summary
This report provides a comprehensive overview of Bring Your Own Device (BYOD) security, exploring its emergence as a network administration approach and the associated challenges. It delves into the limitations of traditional mobile device management and highlights the importance of network-based protection systems. The report introduces Programmable BYOD Security (PBS) as a novel solution leveraging Software Defined Networks (SDN) to enhance network management and enforce policies on mobile devices and applications. It discusses relevant technologies like Android Device Management (ADA) and Mobile Device Management (MDM) and analyzes the challenges of BYOD, including application awareness, network visibility, and dynamic policy programming. The report identifies gaps in existing security measures and summarizes future research directions, particularly focusing on Android-based enterprise systems and the development of robust security functions. It concludes by emphasizing the significance of PBS in complementing existing security solutions and providing a new direction for BYOD security, with an emphasis on the dynamic control of user context information.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: INFORMATION SECURITY
INFORMATION SECURITY
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1INFORMATION SECURITY
Introduction
BYOD stands for bring your own device, which is considered to be an emerging kind of
network administration. Despite of the benefits of BYOD it is more focused to various kinds of
new challenges in terms to security in various enterprise network. In existing kind of solution
like management of mobile device its mainly focus on providing protection and control to data of
device (Rafferty, Iqbal & Hung, 2017). It mainly tends to fall short in providing network-based
protection system. New innovation in this domain in more focused in providing network
administration which mainly comes up with network policies and capabilities over device and
mobile based application. Various kinds of new PBS that is programmable BYOD security is a
new kind of security which mainly has the function of network management and enforcement on
various mobile based application and large number of devices (Wang, Wei & Vangury, 2014).
BYOD is motivated by another kind of technology or concept that is SDN (software defined
networks).
In the coming pages of the report an overview of the involved technology that is BYOD
and its countermeasures has been provided. Various kinds of relevant technologies to BYOD like
PBS (programmable BYOD security) has been discussed in details in the above pages of the
report. Various kinds of challenges and issues and BYOD has been provided in brief in the above
pages of the report. An analysis has been done on the fact that whether this technology has any
kind of gap or not. After that a summary has been provided regarding the future of BYOD
devices and their countermeasures.
Document Page
2INFORMATION SECURITY
Discussion
Overview of technology
BYOD is considered to be new kind of technology which has come into action in last few
years. Various enterprise round the globe are encountering limitation for the traditional
infrastructure, growing cost of overhead and along with a slow process of adaptation of new
kinds of technology. BYOD generally enables various kinds of enterprise to implement their own
devices in the given workplace (Rafferty, Iqbal & Hung, 2017). Bring your own device can be
defined as the shift in cost overhead of ownership of device from any kind of corporation.
BYOD has some kind of crux which is considered to be close and convolution of interplay in
relation of network security. Mis- management can be easily defined by the users which open
workplace to provide an array of unwanted and malicious applications. In the present situation
there are new kinds of challenges which can be easily used by various BYOD enabled or based
devices which are running on them. Overcoming to and fro work is well known kind of work
which is totally based on safe haven of the organization. Generally, this type of device requires
extra security even outside various threats(Wang, Wei & Vangury, 2014). It is important for
various kinds of security network to need more kind of security and capabilities based on
management for managing the device. Without the help of proper kinds of tools, the benefits
which is provided by BYOD is mainly overshadowed by various kinds of holes which are
created in management of security of enterprise.
Relevant technologies and its application
Google has come with a system known as wide management system known as android
device management (ADA) which was previously known as Android 2.2. The system is more
focused to management related features through the help of API. It is much more focused to
Document Page
3INFORMATION SECURITY
provide large number of security related awareness about application of device. Various kinds of
techniques like secure kind of strong password enforcement of policy and wiping of remote
devices which are provided by ADA (Rafferty, Iqbal & Hung, 2017). At present the complex
nature of deployment generally needs more kinds of features and reconfiguration which is
mainly used for securing of developing network. Solutions like mobile device management tends
to provide complexity in managing of capabilities. Support of OS level encryption tend to
provide corporate and personal kind of data for implementation of BYOD (Siboni et al, 2016).
The solution merely focuses on the various kinds of device and application of data which can
easily control and provide protection. They generally do not have sufficient kind of network
features like fine- grained network security features and access control. It is considered to have
problem for managing comprehensive for managing any kind of scenario. One of the practice
which can be applied to present security policy is making use of new kind of BYOD device is
making use of extra kind of network-based controls (Putri, & Hovav, 2014). A proper kind of
management of in today’s mobile based BYOD devices is nothing but management of dynamic
kind of network-based devices. Various kinds of devices tend to move for change in run-time at
time of operation. PBS or programmable BYOD security is considered to be new kind of security
solution which is considered to be fine grained. Programmable network security which is
implemented to BYOD device of enterprise networks. The ultimate solution can be achieved by
the help of software defined networks, that ultimately provides a new based architecture for
providing visibility of network side, program and along with control (Bello, Murray &
Armarego, 2017). Various kinds of existing SDN techniques are also required for making
changes in the network infrastructure like switches and routers. PBS is mainly applied to concept
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4INFORMATION SECURITY
of SDN for mobile based hardware and it does not require any kinds of changes in the present
infrastructure of network.
Challenges and problems
There are large number of issues and challenges in BYOD like application of awareness
and visibility of network, dynamic policy programming.
Application awareness and network visibility: A proper kind of issue in BYOD
enterprise of network administration is nothing but the maintenance of view of devices and their
application on the network. It is generally possible for large number of devices to establish
connection through basic kind of connection which is established through network-based
monitoring (Bothur, Zheng & Valli, 2017). Some kinds of advanced information are all about
context of a devices and details of application which is mainly available in various kinds of
traditional tools. Let us consider an application in which data can be easily transmitted by a
network interface like 3G/ 4G interfaces which is considered to be visible to network
administrator.
Along with the problem of making enforcement on network side security policy of
BYOD devices is considered to be of critical kind of importance. Let us consider an example in
which an administrator tries to provide restriction to the resources of an organization like server
of data which is used for specific kind of application when a device is present in room. Access
which is restricted to network can be easily implemented by various kinds of traditional based
networks by the help of network scheme like network side firewall (Hasan et al, 2015). It mainly
comes up with two kinds of limitation. Firstly, present models cannot be used for devices and
wide range of application. Secondly it comes up with static problem which cannot easily react to
Document Page
5INFORMATION SECURITY
change in network dynamics. So, it can be taken into account like new kinds of devices which
requires an analysis on additional kind of logic which is based on static kind of configuration.
Dynamic policy programming: It comes up with ability to easily provide dynamic kind
of policy which is based on programmable updates which is considered to be a key kind of
motivation in any kind of work. Let us consider an example in which network administrator is
planning to provide a proper kind of application which is based on specific time and locations
along with some kind of restrictions (Tu et al. 2015). It also allows social media application
during lunch hours and in certain areas which is mainly designed for breaks during the
predefined time. It also come up with advantageous related to dynamic kind of policies and it
also capable of redirecting suspicious kind of traffic.
Identification of gap
Though PBS come up with fine policies enforcement, it comes up low kind of overhead
effect in BYOD devices. Still it needs to have hurdles in implementation of present prototype.
Some kind of malicious can easily affect the violation of policy. In order to have proper kind of
access to some kind of restricted services a user can easily attempt to turn off large number of
context with respect to function of GPS (Hovav & Putri, 2016). This new kind of system will
mainly drop a loss of secure connection in which a system will ultimate tend to drop various
kinds of packets during of losing of a connection. A user can easily attempt for turning all the
process and modules which are based on kernel. The provided system can easily operate in
relation to environment which is provided by it. The network administrator can easily depend on
many kind of MDM system for providing assistance to large number of devices.
Portability can be easily defined as a important kind of factor which is used for achieving
proper kind of coverage in a development of BYOD (Sindre & Vegendla, 2015). PBS DROID is
Document Page
6INFORMATION SECURITY
a known to be android kind of implementation which has come up with android design principle
which is considered to be android based implementation and various kinds of underlying
engineering-based activity.
Summarization of future research
In coming future various kinds of android systems at various kinds of enterprise. Various
kinds of android based enterprise create a API which ultimately results in creation of better and
stronger kinds of security awareness in various kinds of security functions. API is mainly
focused in providing in large number of security functions (Sindre & Vegendla, 2015). It can be
easily achieved by providing a limit to minimum on password of device length along disabling
various camera and shortening of lock out activity. Dendroid is a known to be well known kind
of problem which is mainly addresses which mainly focus on its enforcement. Air bag mainly
makes use of virtualization-based approach which is mainly used for isolation of various kinds of
trusted application. This application can be easily used for large number of purpose.
Conclusion
From the above discussion it can be easily concluded that this report is all about BYOD
and its countermeasures. An idea has been provided regarding PBS that is programmable BYOD
security. This new technology has been motivated by the concept or idea of software defined
network (SDN). It mainly tends to provide an application and networks which are mainly based
PBS- Droid of android platform. With the help of PBS, the administration will be ultimately
benefited from large kind of global network and programs of fine grained policy. PBS droid can
be considered to be a concrete kind of client implementation on various kinds of android
platforms. Without the help of PBS-DROID which is considered to concentre kind of client
implementation for various kinds of Android platform. PBS droid can easily the various kinds of
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7INFORMATION SECURITY
the policy of dynamic control taking into consideration of context of user’s information. PBS can
be defined as a great kind of complement which is mainly present in existing kind of solution-
based security and provides a new kind of direction which is considered to be important Security
of BYOD. In the above pages of this report an idea has been provided regarding BYOD and its
countermeasures. Different types of relevant technologies like PBS has been discussed in details
Different kinds of technologies and challenges which associated in BYOD has been discussed in
details in the above pages of the report. A proper kind of analysis has been done on the fact that
whether BYOD devices have any kind of gap or not. In the end a summary has been provided
regarding BYOD devices and its countermeasures.
Document Page
8INFORMATION SECURITY
References
Aenugu, N. R., Butakov, S., Zavarsky, P., & Aghili, S. (2018). Security Perspective in
Comparative Study of Platform-Based and Platform-Less BYOD Systems. In IT
Convergence and Security 2017 (pp. 137-145). Springer, Singapore.
Agudelo, C. A., Bosua, R., Ahmad, A., & Maynard, S. B. (2016). Mitigating Knowledge
Leakage Risk in Organizations through Mobile Devices: A Contextual Approach.
Bello, A. G., Murray, D., & Armarego, J. (2017). A systematic approach to investigating how
information security and privacy can be achieved in BYOD environments. Information &
Computer Security, 25(4), 475-492.
Bothur, D., Zheng, G., & Valli, C. (2017). A critical analysis of security vulnerabilities and
countermeasures in a smart ship system.
Gomes, J. F., Iivari, M., Ahokangas, P., Isotalo, L., & Niemelä, R. (2017). Cybersecurity
Business Models for IoT-Mobile Device Management Services in Futures Digital
Hospitals. Journal of ICT Standardization, 5(1), 107-128.
Hasan, B., Mahmoud, T., Gómez, J. M., Pramod, R., & Kurzhöfer, J. (2015). User acceptance
identification of restrictions caused by mobile security countermeasures. MOBILITY
2015, 39.
Hong, S., Baykov, R., Xu, L., Nadimpalli, S., & Gu, G. (2016, February). Towards SDN-Defined
Programmable BYOD (Bring Your Own Device) Security. In NDSS.
Document Page
9INFORMATION SECURITY
Hovav, A., & Putri, F. F. (2016). This is my device! Why should I follow your rules?
Employees’ compliance with BYOD security policy. Pervasive and Mobile
Computing, 32, 35-49.
Lowry, P. B., Dinev, T., Willison, R., Belanger, F., Benbasat, I., Brown, S. A., ... & Rao, H. R.
(2015). Call for Papers: European Journal of Information Systems (EJIS) Special Issue on
Security and Privacy in 21 st Century Organisations. European Journal of Information
Systems.
Putri, F. F., & Hovav, A. (2014). Employees compliance with BYOD security policy: Insights
from reactance, organizational justice, and protection motivation theory.
Rafferty, L., Iqbal, F., & Hung, P. C. (2017). A Security Threat Analysis of Smart Home
Network with Vulnerable Dynamic Agents. In Computing in Smart Toys (pp. 127-147).
Springer, Cham.
Siboni, S., Shabtai, A., Tippenhauer, N. O., Lee, J., & Elovici, Y. (2016). Advanced security
testbed framework for wearable IoT devices. ACM Transactions on Internet Technology
(TOIT), 16(4), 26.
Sindre, G., & Vegendla, A. (2015). E-exams versus paper exams: A comparative analysis of
cheating-related security threats and countermeasures. In Norwegian Inf Secur Conf
(NISK) (Vol. 8, No. 1, pp. 34-45).
Tu, Z., Turel, O., Yuan, Y., & Archer, N. (2015). Learning to cope with information security
risks regarding mobile device loss or theft: An empirical examination. Information &
Management, 52(4), 506-517.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10INFORMATION SECURITY
Wang, Y., Wei, J., & Vangury, K. (2014, January). Bring your own device security issues and
challenges. In Consumer Communications and Networking Conference (CCNC), 2014
IEEE 11th (pp. 80-85). IEEE.
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]