{"title":"Protection Against Unauthorized Access of Mobile Devices When Using the BYOD Concept","authors":"A. A. Kornienko, S. V. Kornienko, N. S. Razzhivin","doi":"10.3103/S0146411624700998","DOIUrl":null,"url":null,"abstract":"<p>The problems of using mobile devices in the work process of an organization when applying the BYOD concept are analyzed. An adapted methodology for assessing security threats is proposed for BYOD concepts. As a supplement to the traditional approach to building a system for ensuring information security in a corporate information system based on BYOD, a software tool for controlling unauthorized access to mobile devices is developed and tested.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1326 - 1335"},"PeriodicalIF":0.6000,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","FirstCategoryId":"1085","ListUrlMain":"https://link.springer.com/article/10.3103/S0146411624700998","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The problems of using mobile devices in the work process of an organization when applying the BYOD concept are analyzed. An adapted methodology for assessing security threats is proposed for BYOD concepts. As a supplement to the traditional approach to building a system for ensuring information security in a corporate information system based on BYOD, a software tool for controlling unauthorized access to mobile devices is developed and tested.
期刊介绍:
Automatic Control and Computer Sciences is a peer reviewed journal that publishes articles on• Control systems, cyber-physical system, real-time systems, robotics, smart sensors, embedded intelligence • Network information technologies, information security, statistical methods of data processing, distributed artificial intelligence, complex systems modeling, knowledge representation, processing and management • Signal and image processing, machine learning, machine perception, computer vision