Repository logo
Repository
Browse
SLIIT Journals
OPAC
Log In
  1. Home
  2. Browse by Author

Browsing by Author "Peiris, D.P.K.L."

Filter results by typing the first few letters
Now showing 1 - 1 of 1
  • Results Per Page
  • Sort Options
  • Thumbnail Image
    PublicationEmbargo
    Open-Source Information Security and Audit framework for BYOD
    (2021) Peiris, D.P.K.L.
    In today's pandemic environment, businesses are continuously looking for innovative solutions to assist with their corporate operations. Businesses aim to incorporate contemporary technological advances in order to stay ahead of the competition and expand their business in terms of both outcomes and productivity. "Bring your own device" is one of the new phenomena (BYOD). Instead of company providing the required hardware/software to their employees they can use their own device. Employees are permitted to use their own laptops, tabs or cell phones at work when BYOD rules are adopted. Because they are already familiar with how these devices work, they are more likely to be more efficient. The benefits of this led to greater employee satisfaction and allow the company to pass on more expenses to the employee, therefore improving its costeffectiveness. [1] This has made workers' jobs easier and contributed to increased efficiency. Security is the most important factor in BYOD, which has a range of issues. [2] By 2020, 74% of organizations would have experienced data breaches due to unsecure mobile device use. The idea of employees bringing their own devices to work would keep any IT manager up at night (BYOD). While bringing your own device increases productivity, IT experts are aware that bringing your own device exposes your organization to severe security threats. [9] As a result, BYOD device security methods have irritated the interest of IT experts. MDM, MAM, and NAC are just a few of the BYOD device security frameworks that are now accessible. As a consequence, businesses can employ those security measures to prevent data breaches. If such a security system exists, there is no automatic IT Security and auditing tool in it to deliver compliance information to IT experts so they can respond quickly. As a result, I've picked that gap as a study topic in order to present open source as a compliance alternative to companies. Based on the study's findings, the suggested security and audit methodology would assist businesses in reducing and recognizing BYOD security concerns. This security and audit methodology will also help to the creation of new information security expertise in the event of BYODs. [18] Also this solution will be replacement for system Virtualization

Copyright 2025 © SLIIT. All Rights Reserved.

  • Privacy policy
  • End User Agreement
  • Send Feedback