Abstract
With the advent of new devices like smart devices and tablets and with the technology transformations in the way devices are getting connected coupled with the paradigm shift in the way information and services are brought together the usage of these smart devices has become a common entity in personal and professional environments. Organizations are encouraging the usage of these smart devices via varying connectivity mechanisms like wireless and wired technologies. This model of “Bring your Own Device (BYOD)” significantly improves the productivity and enriches economy growth. However it poses a greater threat to information and infrastructure security. This paper discusses security policies (BYOD polices) to secure organizational data and resources along with solutions to resolve the attacks on the device and corporate network. This paper also presents evaluation of possible outcomes of solutions based on the X.800 security architecture.
Cite
CITATION STYLE
. P. S. (2015). SURVEY ON BYOD SECURITY RISKS AND ARCHITECTURES. International Journal of Research in Engineering and Technology, 04(26), 35–39. https://doi.org/10.15623/ijret.2015.0426008
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.