and pdfFriday, April 30, 2021 1:30:39 PM1

Bring Your Own Device Security Issues And Challenges Pdf

bring your own device security issues and challenges pdf

File Name: bring your own device security issues and challenges .zip
Size: 1570Kb
Published: 30.04.2021

We apologize for the inconvenience...

BYOD is a practice by many organizations where employees can use their personal devices for work purpose. BYOD may bring a lot of advantages, but it also leads to security issues such as data leakages. This research proposes a user trust model that includes multifactor authentication combining with public and private key generated by blockchain and an agentless device trust model that can scan for malware and detect the device location. In order to secure the record and sensitive data, the record keeping model is built using blockchain technology where every activity related to the record is recorded in the digital ledger. This ledger can be used as evidence collection for further investigation. Ni, X.

To browse Academia. Skip to main content. By using our site, you agree to our collection of information through the use of cookies. To learn more, view our Privacy Policy. Log In Sign Up.

Reducing the risks of BYOD in the enterprise (free PDF)

As familiarity with and convenience of using personal devices in hospitals help improve the productivity, efficiency, and workflow of hospital staff, the health care bring-your-own-device BYOD market is growing consistently. However, security concerns owing to the lack of control over the personal mobile devices of staff, which may contain sensitive data such as personal health information of patients, make it one of the biggest health care information technology IT challenges for hospital administrations. Given that the hospital BYOD security has not been adequately addressed in peer-reviewed literature, the aim of this paper was to identify key security challenges associated with hospital BYOD usage as well as relevant solutions that can cater to the identified issues by reviewing gray literature. Therefore, this research will provide additional practical insights from current BYOD practices. A comprehensive gray literature review was conducted, which followed the stepwise guidelines and quality assessment criteria set out by Garousi et al.

Skip to Main Content. A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. Use of this web site signifies your agreement to the terms and conditions. Bring your own device security issues and challenges Abstract: As mobile devices become prevalent in workplaces, it also creates a unique environment, Bring Your Own Device, in enterprise networks. Security tools such as firewalls, anti-virus software, and anti-spam software have been widely used to protect corporate networks. Similar tools are also desired to protect BYODs. BYODs have many advantages, such as reducing companies' cost and increasing users' productivity.

IT Consumerization: A Case Study of BYOD in a Healthcare Setting

Discover how leading risk management practices create value and a competitive advantage by embracing disruption with trust and confidence. But they are embracing these risks, updating their risk functions and sharing risk intelligence to generate fresh value through aggressive innovation that gives them a competitive advantage. Learn how best-in-class risk management will create value through driving confidence in achieving strategic objectives and maintaining stakeholder trust. Risk is one of nine focus areas in our framework for building enterprise resilience.

Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device BYOD. However, many such companies overlook potential security risks concerning privacy and confidentiality. This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD. This review spans a large spectrum of information security research, ranging from management risk and policy to technical aspects of privacy and confidentiality in BYOD. Furthermore, this study proposes a policy-based framework for preserving data confidentiality in BYOD.

Skip to search form Skip to main content You are currently offline. Some features of the site may not work correctly. Chen and Jiao Li and Thomas K. Hoang and X.

Росио попробовала закричать, но в легких не было воздуха. Он вот-вот задавит. Уже теряя сознание, она рванулась к свету, который пробивался из приоткрытой двери гостиничного номера, и успела увидеть руку, сжимающую пистолет с глушителем. Яркая вспышка - и все поглотила черная бездна.

 Это лишь означает, - сказала она, пожимая плечами, - что сегодня мы не взломали ни одного шифра. ТРАНСТЕКСТ устроил себе перерыв. - Перерыв? - Бринкерхофф не был в этом уверен. Он достаточно долго проработал бок о бок с директором и знал, что перерыв не относился к числу поощряемых им действий - особенно когда дело касалось ТРАНСТЕКСТА.

Повсюду мелькали красно-бело-синие прически. Беккер вздохнул, взвешивая свои возможности. Где ей еще быть в субботний вечер. Проклиная судьбу, он вылез из автобуса.

Замечательный город.

Он понимал, что мы могли решиться на это только в одном случае - если нашли Северную Дакоту. По спине Сьюзан пробежал холодок. - Конечно, - чуть слышно сказала.  - Танкадо подумал, что раз мы приостановили действие его страхового полиса, то можем приостановить и его .

 Turista, - усмехнулся. И прошептал чуть насмешливо: - Llamo un medico. Вызвать доктора. Беккер поднял глаза на усыпанное родинками старческое лицо.

Телефонистка отвесила еще один поклон: - Я говорила с телефонной компанией. Звонок был сделан из страны с кодом один - из Соединенных Штатов. Нуматака удовлетворенно мотнул головой. Хорошая новость. Звонок из Соединенных Штатов.

Стратмор увидел пятна крови на ее блузке и тотчас пожалел о своей вспышке. - Боже, Сьюзан, с тобой все в порядке. Она промолчала.

1 Comments

  1. Sabrina W.

    02.05.2021 at 00:34
    Reply

    Please Log in or Register.

Your email address will not be published. Required fields are marked *