{"title":"An Evaluation of the Proposed Security Access Control for BYOD Devices with Mobile Device Management (MDM)","authors":"Jimshith. V.T, Mary Amala Bai V","doi":"10.37391/ijeer.120138","DOIUrl":null,"url":null,"abstract":"Bring Your Own Device (BYOD) at Work is a growing practice that has significantly increased network security vulnerabilities. This development has tremendous implications for both businesses and individuals in every organization. As a result of the extensive spreading of viruses, spyware, and other problematic downloads onto personal devices, the government has been forced to examine its data protection legislation. Dangerous apps are downloaded into personal devices without the user's awareness. As a result, both people and governments may suffer disastrous repercussions. In this research, proposed BYODs are troublesome since they can change policies without consent and expose private information. This type of privacy violation has a domino effect, resulting in substantial legal and financial consequences as well as decreased productivity for enterprises and governments. Governments have a daunting problem since they must protect networks from these threats while simultaneously considering user rights and privacy legislation. The framework of this paper that decreases the number of system limits and access control methods that are established for BYODs and cloud environments has been presented by the researchers of the study. They also attempted to protect user privacy by implementing Mobile Device Management (MDM) technology. The study's preliminary findings were optimistic, implying that the framework might reduce access control difficulties.","PeriodicalId":158560,"journal":{"name":"International Journal of Electrical and Electronics Research","volume":"113 6","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Electrical and Electronics Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.37391/ijeer.120138","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Bring Your Own Device (BYOD) at Work is a growing practice that has significantly increased network security vulnerabilities. This development has tremendous implications for both businesses and individuals in every organization. As a result of the extensive spreading of viruses, spyware, and other problematic downloads onto personal devices, the government has been forced to examine its data protection legislation. Dangerous apps are downloaded into personal devices without the user's awareness. As a result, both people and governments may suffer disastrous repercussions. In this research, proposed BYODs are troublesome since they can change policies without consent and expose private information. This type of privacy violation has a domino effect, resulting in substantial legal and financial consequences as well as decreased productivity for enterprises and governments. Governments have a daunting problem since they must protect networks from these threats while simultaneously considering user rights and privacy legislation. The framework of this paper that decreases the number of system limits and access control methods that are established for BYODs and cloud environments has been presented by the researchers of the study. They also attempted to protect user privacy by implementing Mobile Device Management (MDM) technology. The study's preliminary findings were optimistic, implying that the framework might reduce access control difficulties.