BYOD and Its Benefits
Discuss about the benefits of BYOD Security.
BYOD stands for bring your own device, which is considered to be an emerging kind of network administration. Despite of the benefits of BYOD it is more focused to various kinds of new challenges in terms to security in various enterprise network. In existing kind of solution like management of mobile device its mainly focus on providing protection and control to data of device (Rafferty, Iqbal & Hung, 2017). It mainly tends to fall short in providing network-based protection system. New innovation in this domain in more focused in providing network administration which mainly comes up with network policies and capabilities over device and mobile based application. Various kinds of new PBS that is programmable BYOD security is a new kind of security which mainly has the function of network management and enforcement on various mobile based application and large number of devices (Wang, Wei & Vangury, 2014). BYOD is motivated by another kind of technology or concept that is SDN (software defined networks).
In the coming pages of the report an overview of the involved technology that is BYOD and its countermeasures has been provided. Various kinds of relevant technologies to BYOD like PBS (programmable BYOD security) has been discussed in details in the above pages of the report. Various kinds of challenges and issues and BYOD has been provided in brief in the above pages of the report. An analysis has been done on the fact that whether this technology has any kind of gap or not. After that a summary has been provided regarding the future of BYOD devices and their countermeasures.
Overview of technology
BYOD is considered to be new kind of technology which has come into action in last few years. Various enterprise round the globe are encountering limitation for the traditional infrastructure, growing cost of overhead and along with a slow process of adaptation of new kinds of technology. BYOD generally enables various kinds of enterprise to implement their own devices in the given workplace (Rafferty, Iqbal & Hung, 2017). Bring your own device can be defined as the shift in cost overhead of ownership of device from any kind of corporation. BYOD has some kind of crux which is considered to be close and convolution of interplay in relation of network security. Mis- management can be easily defined by the users which open workplace to provide an array of unwanted and malicious applications. In the present situation there are new kinds of challenges which can be easily used by various BYOD enabled or based devices which are running on them. Overcoming to and fro work is well known kind of work which is totally based on safe haven of the organization. Generally, this type of device requires extra security even outside various threats(Wang, Wei & Vangury, 2014). It is important for various kinds of security network to need more kind of security and capabilities based on management for managing the device. Without the help of proper kinds of tools, the benefits which is provided by BYOD is mainly overshadowed by various kinds of holes which are created in management of security of enterprise.
Challenges and Issues in BYOD
Relevant technologies and its application
Google has come with a system known as wide management system known as android device management (ADA) which was previously known as Android 2.2. The system is more focused to management related features through the help of API. It is much more focused to provide large number of security related awareness about application of device. Various kinds of techniques like secure kind of strong password enforcement of policy and wiping of remote devices which are provided by ADA (Rafferty, Iqbal & Hung, 2017). At present the complex nature of deployment generally needs more kinds of features and reconfiguration which is mainly used for securing of developing network. Solutions like mobile device management tends to provide complexity in managing of capabilities. Support of OS level encryption tend to provide corporate and personal kind of data for implementation of BYOD (Siboni et al, 2016). The solution merely focuses on the various kinds of device and application of data which can easily control and provide protection. They generally do not have sufficient kind of network features like fine- grained network security features and access control. It is considered to have problem for managing comprehensive for managing any kind of scenario. One of the practice which can be applied to present security policy is making use of new kind of BYOD device is making use of extra kind of network-based controls (Putri, & Hovav, 2014). A proper kind of management of in today’s mobile based BYOD devices is nothing but management of dynamic kind of network-based devices. Various kinds of devices tend to move for change in run-time at time of operation. PBS or programmable BYOD security is considered to be new kind of security solution which is considered to be fine grained. Programmable network security which is implemented to BYOD device of enterprise networks. The ultimate solution can be achieved by the help of software defined networks, that ultimately provides a new based architecture for providing visibility of network side, program and along with control (Bello, Murray & Armarego, 2017). Various kinds of existing SDN techniques are also required for making changes in the network infrastructure like switches and routers. PBS is mainly applied to concept of SDN for mobile based hardware and it does not require any kinds of changes in the present infrastructure of network.
Challenges and problems
There are large number of issues and challenges in BYOD like application of awareness and visibility of network, dynamic policy programming.
Programmable BYOD Security (PBS)
Application awareness and network visibility: A proper kind of issue in BYOD enterprise of network administration is nothing but the maintenance of view of devices and their application on the network. It is generally possible for large number of devices to establish connection through basic kind of connection which is established through network-based monitoring (Bothur, Zheng & Valli, 2017). Some kinds of advanced information are all about context of a devices and details of application which is mainly available in various kinds of traditional tools. Let us consider an application in which data can be easily transmitted by a network interface like 3G/ 4G interfaces which is considered to be visible to network administrator.
Along with the problem of making enforcement on network side security policy of BYOD devices is considered to be of critical kind of importance. Let us consider an example in which an administrator tries to provide restriction to the resources of an organization like server of data which is used for specific kind of application when a device is present in room. Access which is restricted to network can be easily implemented by various kinds of traditional based networks by the help of network scheme like network side firewall (Hasan et al, 2015). It mainly comes up with two kinds of limitation. Firstly, present models cannot be used for devices and wide range of application. Secondly it comes up with static problem which cannot easily react to change in network dynamics. So, it can be taken into account like new kinds of devices which requires an analysis on additional kind of logic which is based on static kind of configuration.
Dynamic policy programming: It comes up with ability to easily provide dynamic kind of policy which is based on programmable updates which is considered to be a key kind of motivation in any kind of work. Let us consider an example in which network administrator is planning to provide a proper kind of application which is based on specific time and locations along with some kind of restrictions (Tu et al. 2015). It also allows social media application during lunch hours and in certain areas which is mainly designed for breaks during the predefined time. It also come up with advantageous related to dynamic kind of policies and it also capable of redirecting suspicious kind of traffic.
Identification of gap
Though PBS come up with fine policies enforcement, it comes up low kind of overhead effect in BYOD devices. Still it needs to have hurdles in implementation of present prototype. Some kind of malicious can easily affect the violation of policy. In order to have proper kind of access to some kind of restricted services a user can easily attempt to turn off large number of context with respect to function of GPS (Hovav & Putri, 2016). This new kind of system will mainly drop a loss of secure connection in which a system will ultimate tend to drop various kinds of packets during of losing of a connection. A user can easily attempt for turning all the process and modules which are based on kernel. The provided system can easily operate in relation to environment which is provided by it. The network administrator can easily depend on many kind of MDM system for providing assistance to large number of devices.
Network Administration and Management of Mobile-Based Applications and Devices
Portability can be easily defined as a important kind of factor which is used for achieving proper kind of coverage in a development of BYOD (Sindre & Vegendla, 2015). PBS DROID is a known to be android kind of implementation which has come up with android design principle which is considered to be android based implementation and various kinds of underlying engineering-based activity.
In coming future various kinds of android systems at various kinds of enterprise. Various kinds of android based enterprise create a API which ultimately results in creation of better and stronger kinds of security awareness in various kinds of security functions. API is mainly focused in providing in large number of security functions (Sindre & Vegendla, 2015). It can be easily achieved by providing a limit to minimum on password of device length along disabling various camera and shortening of lock out activity. Dendroid is a known to be well known kind of problem which is mainly addresses which mainly focus on its enforcement. Air bag mainly makes use of virtualization-based approach which is mainly used for isolation of various kinds of trusted application. This application can be easily used for large number of purpose.
Conclusion
From the above discussion it can be easily concluded that this report is all about BYOD and its countermeasures. An idea has been provided regarding PBS that is programmable BYOD security. This new technology has been motivated by the concept or idea of software defined network (SDN). It mainly tends to provide an application and networks which are mainly based PBS- Droid of android platform. With the help of PBS, the administration will be ultimately benefited from large kind of global network and programs of fine grained policy. PBS droid can be considered to be a concrete kind of client implementation on various kinds of android platforms. Without the help of PBS-DROID which is considered to concentre kind of client implementation for various kinds of Android platform. PBS droid can easily the various kinds of the policy of dynamic control taking into consideration of context of user’s information. PBS can be defined as a great kind of complement which is mainly present in existing kind of solution-based security and provides a new kind of direction which is considered to be important Security of BYOD. In the above pages of this report an idea has been provided regarding BYOD and its countermeasures. Different types of relevant technologies like PBS has been discussed in details Different kinds of technologies and challenges which associated in BYOD has been discussed in details in the above pages of the report. A proper kind of analysis has been done on the fact that whether BYOD devices have any kind of gap or not. In the end a summary has been provided regarding BYOD devices and its countermeasures.
Future of BYOD Devices and Countermeasures
References
Aenugu, N. R., Butakov, S., Zavarsky, P., & Aghili, S. (2018). Security Perspective in Comparative Study of Platform-Based and Platform-Less BYOD Systems. In IT Convergence and Security 2017 (pp. 137-145). Springer, Singapore.
Agudelo, C. A., Bosua, R., Ahmad, A., & Maynard, S. B. (2016). Mitigating Knowledge Leakage Risk in Organizations through Mobile Devices: A Contextual Approach.
Bello, A. G., Murray, D., & Armarego, J. (2017). A systematic approach to investigating how information security and privacy can be achieved in BYOD environments. Information & Computer Security, 25(4), 475-492.
Bothur, D., Zheng, G., & Valli, C. (2017). A critical analysis of security vulnerabilities and countermeasures in a smart ship system.
Gomes, J. F., Iivari, M., Ahokangas, P., Isotalo, L., & Niemelä, R. (2017). Cybersecurity Business Models for IoT-Mobile Device Management Services in Futures Digital Hospitals. Journal of ICT Standardization, 5(1), 107-128.
Hasan, B., Mahmoud, T., Gómez, J. M., Pramod, R., & Kurzhöfer, J. (2015). User acceptance identification of restrictions caused by mobile security countermeasures. MOBILITY 2015, 39.
Hong, S., Baykov, R., Xu, L., Nadimpalli, S., & Gu, G. (2016, February). Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security. In NDSS.
Hovav, A., & Putri, F. F. (2016). This is my device! Why should I follow your rules? Employees’ compliance with BYOD security policy. Pervasive and Mobile Computing, 32, 35-49.
Lowry, P. B., Dinev, T., Willison, R., Belanger, F., Benbasat, I., Brown, S. A., … & Rao, H. R. (2015). Call for Papers: European Journal of Information Systems (EJIS) Special Issue on Security and Privacy in 21 st Century Organisations. European Journal of Information Systems.
Putri, F. F., & Hovav, A. (2014). Employees compliance with BYOD security policy: Insights from reactance, organizational justice, and protection motivation theory.
Rafferty, L., Iqbal, F., & Hung, P. C. (2017). A Security Threat Analysis of Smart Home Network with Vulnerable Dynamic Agents. In Computing in Smart Toys (pp. 127-147). Springer, Cham.
Siboni, S., Shabtai, A., Tippenhauer, N. O., Lee, J., & Elovici, Y. (2016). Advanced security testbed framework for wearable IoT devices. ACM Transactions on Internet Technology (TOIT), 16(4), 26.
Sindre, G., & Vegendla, A. (2015). E-exams versus paper exams: A comparative analysis of cheating-related security threats and countermeasures. In Norwegian Inf Secur Conf (NISK) (Vol. 8, No. 1, pp. 34-45).
Tu, Z., Turel, O., Yuan, Y., & Archer, N. (2015). Learning to cope with information security risks regarding mobile device loss or theft: An empirical examination. Information & Management, 52(4), 506-517.
Wang, Y., Wei, J., & Vangury, K. (2014, January). Bring your own device security issues and challenges. In Consumer Communications and Networking Conference (CCNC), 2014 IEEE 11th (pp. 80-85). IEEE.