SURVEY ON BYOD SECURITY RISKS AND ARCHITECTURES

  • . P
N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

With the advent of new devices like smart devices and tablets and with the technology transformations in the way devices are getting connected coupled with the paradigm shift in the way information and services are brought together the usage of these smart devices has become a common entity in personal and professional environments. Organizations are encouraging the usage of these smart devices via varying connectivity mechanisms like wireless and wired technologies. This model of “Bring your Own Device (BYOD)” significantly improves the productivity and enriches economy growth. However it poses a greater threat to information and infrastructure security. This paper discusses security policies (BYOD polices) to secure organizational data and resources along with solutions to resolve the attacks on the device and corporate network. This paper also presents evaluation of possible outcomes of solutions based on the X.800 security architecture.

Cite

CITATION STYLE

APA

. P. S. (2015). SURVEY ON BYOD SECURITY RISKS AND ARCHITECTURES. International Journal of Research in Engineering and Technology, 04(26), 35–39. https://doi.org/10.15623/ijret.2015.0426008

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free