Skip to main content

2018 | OriginalPaper | Buchkapitel

30. BYOD: A Security Policy Evaluation Model

verfasst von : Melva M. Ratchford

Erschienen in: Information Technology - New Generations

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The rapid increase of personal mobile devices (mainly smartphones and tablets) accessing corporate data has created a phenomenon commonly known as Bring Your Own Device (BYOD). Companies that allow the use of BYODs need to be aware of the risks of exposing their business to inadvertent data leakage or malicious intent posed by inside or outside threats. The adoption of BYOD policies mitigates these types of risks. However, many companies have weak policies, and the problem of exposure of corporate data persists. This paper addresses this problem by proposing a BYOD policy evaluation method to help companies to strengthen their BYOD policies.
This initial research proposes a novel BYOD security policy evaluation model that aims to identify weaknesses in BYOD policies using mathematical comparisons. The results are measurable and provide specific recommendations to strengthen a BYOD policy. Further research is needed in order to demonstrate the viability and effectiveness of this model.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Souppaya, M., & Scarfone, K. (2013). Guidelines for managing the security of mobile devices in the enterprise NIST Special Publication 800-124 Revision 1. Souppaya, M., & Scarfone, K. (2013). Guidelines for managing the security of mobile devices in the enterprise NIST Special Publication 800-124 Revision 1.
5.
Zurück zum Zitat Wang, Y., Wei, J., & Vangury, K. (2014). Bring your own device security issues and challenges. Consumer Communications and Networking Conference (CCNC), 2014 I.E. 11th, pp. 80–85. Wang, Y., Wei, J., & Vangury, K. (2014). Bring your own device security issues and challenges. Consumer Communications and Networking Conference (CCNC), 2014 I.E. 11th, pp. 80–85.
6.
Zurück zum Zitat Holleran, J. (2014). Building a better BYOD strategy. Risk Management, 61, 12–13. Holleran, J. (2014). Building a better BYOD strategy. Risk Management, 61, 12–13.
7.
Zurück zum Zitat Miller, K. W., Voas, J., & Hurlburt, G. F. (2012). BYOD: Security and privacy considerations. IT Professional, 14, 53–55.CrossRef Miller, K. W., Voas, J., & Hurlburt, G. F. (2012). BYOD: Security and privacy considerations. IT Professional, 14, 53–55.CrossRef
8.
Zurück zum Zitat Thompson, G. (2012). BYOD: Enabling the chaos. Network Security, 2012, 5.CrossRef Thompson, G. (2012). BYOD: Enabling the chaos. Network Security, 2012, 5.CrossRef
9.
Zurück zum Zitat Casola, V., Mazzeo, A., Maxxocca, N., & Vittorini, V. (2007). A policy-based methodology for security evaluation: A security metric for public key infrastructures. Journal of Computer Security, 15, 197–229.CrossRef Casola, V., Mazzeo, A., Maxxocca, N., & Vittorini, V. (2007). A policy-based methodology for security evaluation: A security metric for public key infrastructures. Journal of Computer Security, 15, 197–229.CrossRef
10.
Zurück zum Zitat Vorakulpipat, C., Polprasert, C., & Siwamogsatham, S. (2014). Managing mobile device security in critical infrastructure sectors. Proceedings of the 7th international conference on Security of Information and Networks, p. 65. Vorakulpipat, C., Polprasert, C., & Siwamogsatham, S. (2014). Managing mobile device security in critical infrastructure sectors. Proceedings of the 7th international conference on Security of Information and Networks, p. 65.
11.
Zurück zum Zitat Kumar, R., & Singh, H. (2015). A proactive procedure to mitigate the BYOD risks on the security of an information system. SIGSOFT Software Engineering Notes, 40, 1–4. Kumar, R., & Singh, H. (2015). A proactive procedure to mitigate the BYOD risks on the security of an information system. SIGSOFT Software Engineering Notes, 40, 1–4.
14.
Zurück zum Zitat McCumber, J. (2004). Assessing and managing security risk in IT systems: A structured methodology. CRC Press. Boca Raton. McCumber, J. (2004). Assessing and managing security risk in IT systems: A structured methodology. CRC Press. Boca Raton.
15.
Zurück zum Zitat Peltier, T. R. (2016). Information security policies,procedures, and standards: Guidelines for effective information security management. Chicago: CRC Press. Peltier, T. R. (2016). Information security policies,procedures, and standards: Guidelines for effective information security management. Chicago: CRC Press.
16.
Zurück zum Zitat Wood, C. C. (1995). Writing infosec policies. Computers & Security, 14, 667–674.CrossRef Wood, C. C. (1995). Writing infosec policies. Computers & Security, 14, 667–674.CrossRef
Metadaten
Titel
BYOD: A Security Policy Evaluation Model
verfasst von
Melva M. Ratchford
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-54978-1_30