Publication:
Open-Source Information Security and Audit framework for BYOD

dc.contributor.authorPeiris, D.P.K.L.
dc.date.accessioned2022-08-24T07:06:23Z
dc.date.available2022-08-24T07:06:23Z
dc.date.issued2021
dc.description.abstractIn today's pandemic environment, businesses are continuously looking for innovative solutions to assist with their corporate operations. Businesses aim to incorporate contemporary technological advances in order to stay ahead of the competition and expand their business in terms of both outcomes and productivity. "Bring your own device" is one of the new phenomena (BYOD). Instead of company providing the required hardware/software to their employees they can use their own device. Employees are permitted to use their own laptops, tabs or cell phones at work when BYOD rules are adopted. Because they are already familiar with how these devices work, they are more likely to be more efficient. The benefits of this led to greater employee satisfaction and allow the company to pass on more expenses to the employee, therefore improving its costeffectiveness. [1] This has made workers' jobs easier and contributed to increased efficiency. Security is the most important factor in BYOD, which has a range of issues. [2] By 2020, 74% of organizations would have experienced data breaches due to unsecure mobile device use. The idea of employees bringing their own devices to work would keep any IT manager up at night (BYOD). While bringing your own device increases productivity, IT experts are aware that bringing your own device exposes your organization to severe security threats. [9] As a result, BYOD device security methods have irritated the interest of IT experts. MDM, MAM, and NAC are just a few of the BYOD device security frameworks that are now accessible. As a consequence, businesses can employ those security measures to prevent data breaches. If such a security system exists, there is no automatic IT Security and auditing tool in it to deliver compliance information to IT experts so they can respond quickly. As a result, I've picked that gap as a study topic in order to present open source as a compliance alternative to companies. Based on the study's findings, the suggested security and audit methodology would assist businesses in reducing and recognizing BYOD security concerns. This security and audit methodology will also help to the creation of new information security expertise in the event of BYODs. [18] Also this solution will be replacement for system Virtualizationen_US
dc.identifier.urihttps://rda.sliit.lk/handle/123456789/2932
dc.language.isoenen_US
dc.subjectBYODen_US
dc.subjectBring Your Own Devicesen_US
dc.subjectInformation Securityen_US
dc.subjectSMEen_US
dc.subjectSmall Medium Enterprisesen_US
dc.subjectOpen Sourceen_US
dc.subjectData leakageen_US
dc.titleOpen-Source Information Security and Audit framework for BYODen_US
dc.typeThesisen_US
dspace.entity.typePublication

Files

Original bundle

Now showing 1 - 2 of 2
No Thumbnail Available
Name:
Project Report .pdf
Size:
1.52 MB
Format:
Adobe Portable Document Format
Description:
Thumbnail Image
Name:
Project Report _Abs.pdf
Size:
335.57 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: