Enhancing Security in a Corporate BYOD Environment

Abstract

Bring your own device (BYOD) is a concept of employees using their personal devices to access the organization's network and resources. While it provides advantages such as increased efficiency and productivity, it also provides security risks to organizations such as data breaches and security issues, if an employee’s device is stolen or lost and vulnerable to malware and other security threats since the personal devices are not secure than company-owned devices. To enhance corporate infrastructure security in a BYOD environment, this paper proposes four mechanisms by addressing four issues. The first mechanism is preventing users from accessing the organisation’s documents after their termination which helps to protect confidentiality. Second, detecting suspicious user behaviour through location-based anomaly detection helps to identify whether the device is stolen or lost. Third, assigning permissions based on user roles using a Universally Unique Identifier (UUID) prevents unauthorized device access. Furthermore, employing an Application-Aware Virtual Network Adapter solution helps identify data types and ensures secure usage of corporate data simultaneously. By combining these features, a robust security environment can be achieved, effectively mitigating the risks associated with BYOD. Adopting these comprehensive security approaches allows organizations to reduce BYOD-related risks and safeguard their sensitive data effectively.

Country : Sri Lanka

1 Rathnayaka R.P.P.S2 Swarnamali I. S3 Piyasekara W.D.C4 Karunathilaka N.A5 Kavinga Yapa Abewardena6 Kanishka Yapa

  1. Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  2. Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  3. Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  4. Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  5. Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  6. Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka

IRJIET, Volume 7, Issue 11, November 2023 pp. 329-334

doi.org/10.47001/IRJIET/2023.711045

References

  1. H. A. B. Alotaibi, "A Review of BYOD Security Challenges, Solutions and Policy Best Practices," Saudi Arabia.
  2. Y. H. P. M. T. Oktavia, "Security and Privacy Challenge in Bring Your Own Device Environment: A Systematic Literature Review," in International Conference on Information Management and Technology (ICIMTech), Bandung, Indonesia, 2016.
  3. M. M. R. a. Y. Wang, "BYOD-Insure: A Security Assessment Model for Enterprise BYOD," in 2019 Fifth Conference on Mobile and Secure Services (MobiSecServ) pp. 1-10, doi: 10.1109/MOBISECSERV.2019.8686551., Miami Beach, FL, USA, 2019.
  4. R. M. P. a. P. R. B. N. M. C. Galego, "BYOD : Impact in Architecture and Information Security Corporate Policy," in 17th Iberian Conference on Information Systems and Technologies (CISTI) pp. 1-2, doi: 10.23919/CISTI54924.2022.9820043., Madrid, Spain, 2022.
  5. J. Howarth, "24+ Fascinating BYOD Statistics (2023)," 1 December 2022. [Online]. Available: https://explodingtopics.com/blog/byod-stats.
  6. G. a. M. D. a. A. J. Bello, "A systematic approach to investigating how information security and privacy can be achieved in BYOD environments," in Information \& Computer Security, pp. 475--492, 2017.
  7. W. S. Khoula AlHarthy, "Implement Network Security Control Solutions in BYOD Environment," in 2013 IEEE International Conference on Control System, Computing and Engineering, Penang, Malaysia, 29 Nov. - 1 Dec. 2013.
  8. A.A. &. P. B. Z. Musa Abubakar Muhammad, "Improving Security in Bring Your Own Device (BYOD) Environment by Controlling Access".
  9. J. O. a. C. I. Eun Byol Koh, "A Study on Security Threats and Dynamic Access Control Technology for BYOD, Smart-work Environment," in Proceedings of the International MultiConference of Engineers and Computer Scientists 2014 Vol II, IMECS 2014, Hong Kong, March 12 - 14, 2014.
  10. T. Z. Daniel Petrov, "Context-Aware Deep Learning-Driven Framework for Mitigation of Security Risks in BYOD-Enabled Environments," in IEEE 4th International Conference on Collaboration and Internet Computing, 2018.
  11. W. Z. Z. Dong Xu, "An Improved Data Anomaly Detection Method Based on Isolation Forest," in 10th International Symposium on Computational Intelligence and Design, 2017.
  12. K. M. T. Z.-H. Z. Fei Tony Liu, "Isolation Forest," in Eighth IEEE International Conference on Data Mining, 2008.
  13. M. M. Paul J. Leach, "A Universally Unique IDentifier (UUID) URN Namespace," 2014.
  14. "Management of UUID and version number of data sets," in International Reference Life Cycle Data System (ILCD) Data Network, EUR 25198, 2012.
  15. G. J. G. A. D. R. M. M. A. C. a. P. M. P. Gil, "Computer networks virtualization with GNS3: Evaluating a solution to optimize resources and achieve a distance learning," in IEEE Frontiers in Education Conference (FIE) Proceedings, Madrid, Spain, 2014, pp. 1-4, doi: 10.1109/FIE.2014.7044343., 2014.
  16. F. J. a. K. K. J. Janitor, "Visual Learning Tools for Teaching/Learning Computer Networks: Cisco Networking Academy and Packet Tracer," in Sixth International Conference on Networking and Services, Cancun, Mexico, pp. 351-355, doi: 10.1109/ICNS.2010.55., 2010.
  17. Kaggle, "FourSquare - NYC and Tokyo Check-ins," Kaggle, [Online]. Available: https://www.kaggle.com/datasets/chetanism/foursquare-nyc-and-tokyo-checkin-dataset.
  18. D. Z. V. W. Z. Z. Y. Dingqi Yang, "Modeling User Activity Preference by Leveraging User Spatial Temporal Characteristics in LBSNs.," in IEEE Trans. on Systems, Man, and Cybernetics: Systems, (TSMC), 45(1), 129-142, 2015.