BYOD Security Threats and Countermeasures: An Overview and Analysis

Verified

Added on  2022/11/29

|3
|432
|38
Report
AI Summary
This report delves into the security threats associated with Bring Your Own Device (BYOD) policies, particularly in the context of mobile computing. It explores how the increasing use of personal devices in the workplace, such as smartphones and tablets, introduces vulnerabilities to organizational data and networks. The report examines the challenges related to information security, privacy, and the BYOD environment. It highlights the need for robust countermeasures to mitigate risks, including data breaches and unauthorized access. The report also reviews current organizational practices related to BYOD and emphasizes the importance of understanding the dynamics of privacy and security to successfully leverage BYOD for improved productivity and efficiency. The report also references relevant academic literature to support its analysis.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: SECURITY THREATS RELATED TO BYOD DEVICES AND COUNTERMEASURES
SECURITY THREATS RELATED TO BYOD DEVICES AND COUNTERMEASURES
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
SECURITY THREATS RELATED TO BYOD DEVICES AND COUNTERMEASURES 1
Abstract:
The internet computing has been supplanted by the mobile based computing, because of the
proliferation of the mobile device (example- palmtops, smart phones and tablets) and
applications that are cloud based. With the adoption of information as well as the increasing
development as well as the evolving trends like BYOD (Bring Your Own Device) is
changing rapidly the organizational methods in attempt for improving the productivity and
efficiency. The purpose of this paper is to discuss about the security issues related to the
BYOD devices. This paper also reviews privacy and information security, mobile computing
and the present organisational practices that are related to BYOD. To be benefitted
successfully from BYOD, various dynamics that are related to privacy and security in the
BYOD environment, must be understood and to be examined. At present people can,
experience higher quality computing ay the palms of them through the mobile devices and its
application that are cloud based. The employees bring their own personal devices at the work
places of them for connecting with the organization’s network for performing their jobs.
BYOD is actually an enterprise IT policy, by which the members of the organizations are
encouraged to use the personal mobile devices through the IT infrastructure for accessing the
sensitive corporate information and data at the workplace. Some of the organizations believe
that Bring Your Own Device (BYOD) can help the employees to give more production for
the organisation. However, the BYOD policy also allows the employees to get access in
sensitive organisational data to outside of the enterprise environment.
Document Page
2SECURITY THREATS RELATED TO BYOD DEVICES AND COUNTERMEASURES
References:
Garba, A. B., Armarego, J., Murray, D., & Kenworthy, W. (2015). Review of the information
security and privacy challenges in Bring Your Own Device (BYOD)
environments. Journal of Information privacy and security, 11(1), 38-54.
Olalere, M., Abdullah, M. T., Mahmod, R., & Abdullah, A. (2015). A review of bring your
own device on security issues. Sage Open, 5(2), 2158244015580372.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]