Loading...

Media is loading
 

Paper Type

Complete

Abstract

Often, organizations allow employees the use of their personally owned devices to access corporate data. This phenomenon is identified as Bring Your Own Device (BYOD), and organizations are adopting it without taking into consideration the inherent security risks introduced via BYODs. There are several approaches that organizations can consider for BYOD security. This paper addresses research questions related to the protection of BYOD environments. In general, how can organizations protect against the inherent risks posed by BYODs? What are existing modalities to do so? With this in mind, this research reviews existing BYOD security approaches, such as frameworks, checklists, best practices, and quantitative models, and performs a comparative analysis among such modalities. Based on our research, this comparative study shows that a quantitative model, BYOD-Insure, meets the requirements for security assessment of BYOD environments. The model provides a level of detail, granularity and specificity that existing modalities do not.

Share

COinS
 
Aug 10th, 12:00 AM

BYOD-Insure vs Existing Modalities for BYOD Security Assessment: A Comparison Study

Often, organizations allow employees the use of their personally owned devices to access corporate data. This phenomenon is identified as Bring Your Own Device (BYOD), and organizations are adopting it without taking into consideration the inherent security risks introduced via BYODs. There are several approaches that organizations can consider for BYOD security. This paper addresses research questions related to the protection of BYOD environments. In general, how can organizations protect against the inherent risks posed by BYODs? What are existing modalities to do so? With this in mind, this research reviews existing BYOD security approaches, such as frameworks, checklists, best practices, and quantitative models, and performs a comparative analysis among such modalities. Based on our research, this comparative study shows that a quantitative model, BYOD-Insure, meets the requirements for security assessment of BYOD environments. The model provides a level of detail, granularity and specificity that existing modalities do not.

When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.