Please use this identifier to cite or link to this item: https://rda.sliit.lk/handle/123456789/2932
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPeiris, D.P.K.L.-
dc.date.accessioned2022-08-24T07:06:23Z-
dc.date.available2022-08-24T07:06:23Z-
dc.date.issued2021-
dc.identifier.urihttp://rda.sliit.lk/handle/123456789/2932-
dc.description.abstractIn today's pandemic environment, businesses are continuously looking for innovative solutions to assist with their corporate operations. Businesses aim to incorporate contemporary technological advances in order to stay ahead of the competition and expand their business in terms of both outcomes and productivity. "Bring your own device" is one of the new phenomena (BYOD). Instead of company providing the required hardware/software to their employees they can use their own device. Employees are permitted to use their own laptops, tabs or cell phones at work when BYOD rules are adopted. Because they are already familiar with how these devices work, they are more likely to be more efficient. The benefits of this led to greater employee satisfaction and allow the company to pass on more expenses to the employee, therefore improving its costeffectiveness. [1] This has made workers' jobs easier and contributed to increased efficiency. Security is the most important factor in BYOD, which has a range of issues. [2] By 2020, 74% of organizations would have experienced data breaches due to unsecure mobile device use. The idea of employees bringing their own devices to work would keep any IT manager up at night (BYOD). While bringing your own device increases productivity, IT experts are aware that bringing your own device exposes your organization to severe security threats. [9] As a result, BYOD device security methods have irritated the interest of IT experts. MDM, MAM, and NAC are just a few of the BYOD device security frameworks that are now accessible. As a consequence, businesses can employ those security measures to prevent data breaches. If such a security system exists, there is no automatic IT Security and auditing tool in it to deliver compliance information to IT experts so they can respond quickly. As a result, I've picked that gap as a study topic in order to present open source as a compliance alternative to companies. Based on the study's findings, the suggested security and audit methodology would assist businesses in reducing and recognizing BYOD security concerns. This security and audit methodology will also help to the creation of new information security expertise in the event of BYODs. [18] Also this solution will be replacement for system Virtualizationen_US
dc.language.isoenen_US
dc.subjectBYODen_US
dc.subjectBring Your Own Devicesen_US
dc.subjectInformation Securityen_US
dc.subjectSMEen_US
dc.subjectSmall Medium Enterprisesen_US
dc.subjectOpen Sourceen_US
dc.subjectData leakageen_US
dc.titleOpen-Source Information Security and Audit framework for BYODen_US
dc.typeThesisen_US
Appears in Collections:MSc 2021

Files in This Item:
File Description SizeFormat 
Project Report .pdf
  Until 2050-12-31
1.56 MBAdobe PDFView/Open Request a copy
Project Report _Abs.pdf335.57 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.