Abstract
Mobile computing has supplanted internet computing because of the proliferation of cloud-based applications and mobile devices (such as smartphones, palmtops, and tablets). As a result of this, workers bring their mobile devices to the workplace and use them for enterprise work. The policy of allowing the employees to work with their own personal mobile devices is called Bring Your Own Devices (BYOD). In this article, we discuss BYOD’s background, prevalence, benefits, challenges, and possible security attacks. We then review contributions of academic researchers on BYOD. The Universiti Putra Malaysia online databases (such as IEEE Xplore digital library, Elsevier, Springer, ACM digital library) were used to search for peer-reviewed academic publications and other relevant publications on BYOD. The Google Scholar search engine was also used. Our thorough review shows that security issues comprise the most significant challenge confronting BYOD policy and that very little has been done to tackle this security challenge. It is our hope that this review will provide a theoretical background for future research and enable researchers to identify researchable areas of BYOD.
Highlights
Modern computing has undergone several notable transitions since its birth in the 1960s, with progress from mainframe computing to minicomputers and to client-server-driven personal computing (PC)
Our review searches for peer-reviewed academic research publications, white paper/survey publications, and publications by information security experts by using The Universiti Putra Malaysia online databases published in English language in the area of information and communication
We present a broad view of Bring Your Own Devices (BYOD) policy by providing a theoretical foundation, deployment level, benefits, challenges, possible security attacks, and work done by researchers on BYOD
Summary
Email, and SMS links: Links are embedded in Enterprise applications malfunctioning. SMS, social media posts, and emails with the intention of redirecting users to a website that hosts malicious files Both corporate infrastructure and personal mobile may host malware that can potentially harm devices, devices of employee are affected by malware systems, and networks. EY (2013) presented a white paper that divides the BYOD risk landscape into three areas These areas are securing mobile devices, addressing application risk, and managing mobile environment. Another survey of more than 500 IT professionals aimed to understand and address risk-associated BYOD was carried out by Johnson (2012) The intent of this non-scientific survey was to determine the type of mobile device usage allowed for enterprise applications and what level of policies and controls enterprises have around this type of usage.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.