Research Papers - Dept of Computer Systems Engineering
Permanent URI for this collection https://rda.sliit.lk/handle/123456789/1253
Browse
3 results
Filters
Advanced Search
Filter by
Settings
Search Results
Publication Embargo An Automated Solution For Securing Confidential Documents in a BYOD Environment(IEEE, 2021-12-09) Abisheka, P. A. C; Azra, M. A. F; Poobalan, A. V; Wijekoon, J; Yapa, K; Murthaja, MBYOD or Bring Your Own Device is a set of policies that allow employees of an organization to use their own devices for official work purposes. BYOD is an immensely popular concept in the present day due to the many advantages it provides. However, the implementation of BYOD policies entail diverse problems and as a result, the confidentiality of documents can be breached. Furthermore, employees without security awareness and training are highly vulnerable to endpoint attacks, network attacks, and zero-day attacks that lead to a breach of confidentiality, integrity, and availability (CIA). In this context, this paper proposes a comprehensive solution; ‘BYODENCE’, for the detection and prevention of unauthorized access to organizational documents. BYODENCE is an efficient BYOD solution which can produce competitive results in terms of accuracy and speed.Publication Embargo An Automated Solution For Securing Confidential Documents in a BYOD Environment(2021 3rd International Conference on Advancements in Computing (ICAC), SLIIT, 2021-12-09) Abisheka, P.A.C.; Azra, M.A.F.; Poobalan, A.V.; Wijekoon, J.; Yapa, K.; Murthaja, M.BYOD or Bring Your Own Device is a set of policies that allow employees of an organization to use their own devices for official work purposes. BYOD is an immensely popular concept in the present day due to the many advantages it provides. However, the implementation of BYOD policies entail diverse problems and as a result, the confidentiality of documents can be breached. Furthermore, employees without security awareness and training are highly vulnerable to endpoint attacks, network attacks, and zero-day attacks that lead to a breach of confidentiality, integrity, and availability (CIA). In this context, this paper proposes a comprehensive solution; ‘BYODENCE’, for the detection and prevention of unauthorized access to organizational documents. BYODENCE is an efficient BYOD solution which can produce competitive results in terms of accuracy and speed.Publication Embargo Securing corporate data in mobile devices in a COPE environment(Faculty of Graduate Studies and Research, 2017-01-26) Rathnasekara, C.; Athukorala, T.; Dikwellage, L.; Wickramasuriya, U.; Senarathne, A.; Elvitigala, S.Bring Your Own Devices (BYOD) paved the way for allowing employees to use their own mobile devices for corporate work. But it increases the risk of leaking sensitive corporate information from employee's devices to outside. As a solution for this problem the Corporate Owned Personally Enabled (COPE) concept or idea introduced. In this concept, company owned devices can be used for both corporate and personal use of the employees. But in COPE stopping leakage of corporate data to outside as well as securing the privacy of the user is challenging. The Enterprise Secure Center (ESC) platform discussed here will consider about separation of corporate data from personal data to secure both organization information and personal information from being compromised. The ESC have an application mechanism which will enable COPE environment to secure organization data while allowing employees to use corporate devices for their personal use. ESC platform also provides answers to user's privacy issues and will be an initial step to implement BYOD within an organization as COPE is a part.
