Publication: Open-Source Information Security and Audit framework for BYOD
DOI
Type:
Thesis
Date
2021
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
In today's pandemic environment, businesses are continuously looking for innovative
solutions to assist with their corporate operations. Businesses aim to incorporate
contemporary technological advances in order to stay ahead of the competition and expand
their business in terms of both outcomes and productivity. "Bring your own device" is one
of the new phenomena (BYOD). Instead of company providing the required
hardware/software to their employees they can use their own device. Employees are
permitted to use their own laptops, tabs or cell phones at work when BYOD rules are
adopted. Because they are already familiar with how these devices work, they are more
likely to be more efficient. The benefits of this led to greater employee satisfaction and
allow the company to pass on more expenses to the employee, therefore improving its costeffectiveness. [1] This has made workers' jobs easier and contributed to increased
efficiency.
Security is the most important factor in BYOD, which has a range of issues. [2] By 2020,
74% of organizations would have experienced data breaches due to unsecure mobile device
use. The idea of employees bringing their own devices to work would keep any IT manager
up at night (BYOD). While bringing your own device increases productivity, IT experts are
aware that bringing your own device exposes your organization to severe security threats.
[9] As a result, BYOD device security methods have irritated the interest of IT experts.
MDM, MAM, and NAC are just a few of the BYOD device security frameworks that are
now accessible. As a consequence, businesses can employ those security measures to
prevent data breaches. If such a security system exists, there is no automatic IT Security
and auditing tool in it to deliver compliance information to IT experts so they can respond
quickly.
As a result, I've picked that gap as a study topic in order to present open source as a
compliance alternative to companies. Based on the study's findings, the suggested security
and audit methodology would assist businesses in reducing and recognizing BYOD
security concerns. This security and audit methodology will also help to the creation of new information security expertise in the event of BYODs. [18] Also this solution will be
replacement for system Virtualization
Description
Keywords
BYOD, Bring Your Own Devices, Information Security, SME, Small Medium Enterprises, Open Source, Data leakage
