Current BYOD Security Evaluation System: Future Direction

Priscilla Mateko B, Shikun Mateko Z, Ioannis K
{"title":"Current BYOD Security Evaluation System: Future Direction","authors":"Priscilla Mateko B, Shikun Mateko Z, Ioannis K","doi":"10.4172/2165-7866.1000235","DOIUrl":null,"url":null,"abstract":"There are growing vulnerabilities in Bringing Your Own Device (BYOD) implementation which may not have been fully identified by organisations. It is very difficult to identify, monitor and evaluate the fast growing number of threats and vulnerabilities in a BYOD system, leading to delayed time in preparing and loading a patch which is a periodic process (Static) in most organisation, resulting in risk as the process is not continuous (dynamic) Computer security managers have the task to identify and evaluate these vulnerabilities according to their risk and threat to the network. One database which is known to contain identified vulnerabilities is the Common Vulnerabilities and Exposures (CVE), Common Vulnerabilities Scoring System (CVSS) on the other hand provides numeric scores to each vulnerabilities in the CVE database based on their characteristics and security impact. This assessment is on relevant work to check the various data collected on vulnerability and threat related to BYOD and conduct a vulnerability scoring exercise to report on possible scoring framework.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"8 1","pages":"1-6"},"PeriodicalIF":0.0000,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of information technology & software engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4172/2165-7866.1000235","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

There are growing vulnerabilities in Bringing Your Own Device (BYOD) implementation which may not have been fully identified by organisations. It is very difficult to identify, monitor and evaluate the fast growing number of threats and vulnerabilities in a BYOD system, leading to delayed time in preparing and loading a patch which is a periodic process (Static) in most organisation, resulting in risk as the process is not continuous (dynamic) Computer security managers have the task to identify and evaluate these vulnerabilities according to their risk and threat to the network. One database which is known to contain identified vulnerabilities is the Common Vulnerabilities and Exposures (CVE), Common Vulnerabilities Scoring System (CVSS) on the other hand provides numeric scores to each vulnerabilities in the CVE database based on their characteristics and security impact. This assessment is on relevant work to check the various data collected on vulnerability and threat related to BYOD and conduct a vulnerability scoring exercise to report on possible scoring framework.
当前BYOD安全评估体系:未来方向
在实施自带设备(BYOD)的过程中,越来越多的漏洞可能还没有被组织完全识别出来。在BYOD系统中,快速增长的威胁和漏洞数量很难识别、监控和评估,导致准备和加载补丁的时间延迟,这在大多数组织中是一个周期性的过程(静态),导致风险,因为这个过程不是连续的(动态)。计算机安全管理人员的任务是根据它们对网络的风险和威胁来识别和评估这些漏洞。一个已知包含已识别漏洞的数据库是通用漏洞和暴露(CVE),另一方面,通用漏洞评分系统(CVSS)根据其特征和安全影响为CVE数据库中的每个漏洞提供数字分数。这项评估是对收集到的与BYOD相关的漏洞和威胁的各种数据进行检查,并进行漏洞评分工作,以报告可能的评分框架。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信