An Evaluation of the Proposed Security Access Control for BYOD Devices with Mobile Device Management (MDM)

Jimshith. V.T, Mary Amala Bai V
{"title":"An Evaluation of the Proposed Security Access Control for BYOD Devices with Mobile Device Management (MDM)","authors":"Jimshith. V.T, Mary Amala Bai V","doi":"10.37391/ijeer.120138","DOIUrl":null,"url":null,"abstract":"Bring Your Own Device (BYOD) at Work is a growing practice that has significantly increased network security vulnerabilities. This development has tremendous implications for both businesses and individuals in every organization. As a result of the extensive spreading of viruses, spyware, and other problematic downloads onto personal devices, the government has been forced to examine its data protection legislation. Dangerous apps are downloaded into personal devices without the user's awareness. As a result, both people and governments may suffer disastrous repercussions. In this research, proposed BYODs are troublesome since they can change policies without consent and expose private information. This type of privacy violation has a domino effect, resulting in substantial legal and financial consequences as well as decreased productivity for enterprises and governments. Governments have a daunting problem since they must protect networks from these threats while simultaneously considering user rights and privacy legislation. The framework of this paper that decreases the number of system limits and access control methods that are established for BYODs and cloud environments has been presented by the researchers of the study. They also attempted to protect user privacy by implementing Mobile Device Management (MDM) technology. The study's preliminary findings were optimistic, implying that the framework might reduce access control difficulties.","PeriodicalId":158560,"journal":{"name":"International Journal of Electrical and Electronics Research","volume":"113 6","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Electrical and Electronics Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.37391/ijeer.120138","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Bring Your Own Device (BYOD) at Work is a growing practice that has significantly increased network security vulnerabilities. This development has tremendous implications for both businesses and individuals in every organization. As a result of the extensive spreading of viruses, spyware, and other problematic downloads onto personal devices, the government has been forced to examine its data protection legislation. Dangerous apps are downloaded into personal devices without the user's awareness. As a result, both people and governments may suffer disastrous repercussions. In this research, proposed BYODs are troublesome since they can change policies without consent and expose private information. This type of privacy violation has a domino effect, resulting in substantial legal and financial consequences as well as decreased productivity for enterprises and governments. Governments have a daunting problem since they must protect networks from these threats while simultaneously considering user rights and privacy legislation. The framework of this paper that decreases the number of system limits and access control methods that are established for BYODs and cloud environments has been presented by the researchers of the study. They also attempted to protect user privacy by implementing Mobile Device Management (MDM) technology. The study's preliminary findings were optimistic, implying that the framework might reduce access control difficulties.
利用移动设备管理 (MDM) 对 BYOD 设备的拟议安全访问控制进行评估
在工作中自带设备(BYOD)的做法日益增多,大大增加了网络安全漏洞。这一发展对每个组织的企业和个人都有巨大的影响。由于病毒、间谍软件和其他问题下载在个人设备上的广泛传播,政府不得不对其数据保护立法进行审查。危险应用程序在用户不知情的情况下被下载到个人设备中。因此,人们和政府都可能遭受灾难性的后果。在这项研究中,提议的 BYOD 会带来麻烦,因为它们会在未经同意的情况下更改政策,并暴露私人信息。这种侵犯隐私的行为会产生多米诺骨牌效应,导致严重的法律和经济后果,并降低企业和政府的生产力。政府面临的问题十分棘手,因为它们必须保护网络免受这些威胁,同时还要考虑用户权利和隐私立法。本文的研究人员提出的框架减少了为 BYOD 和云环境建立的系统限制和访问控制方法的数量。他们还试图通过实施移动设备管理(MDM)技术来保护用户隐私。研究的初步结果是乐观的,这意味着该框架可能会减少访问控制方面的困难。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
1.70
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信