{"title":"利用移动设备管理 (MDM) 对 BYOD 设备的拟议安全访问控制进行评估","authors":"Jimshith. V.T, Mary Amala Bai V","doi":"10.37391/ijeer.120138","DOIUrl":null,"url":null,"abstract":"Bring Your Own Device (BYOD) at Work is a growing practice that has significantly increased network security vulnerabilities. This development has tremendous implications for both businesses and individuals in every organization. As a result of the extensive spreading of viruses, spyware, and other problematic downloads onto personal devices, the government has been forced to examine its data protection legislation. Dangerous apps are downloaded into personal devices without the user's awareness. As a result, both people and governments may suffer disastrous repercussions. In this research, proposed BYODs are troublesome since they can change policies without consent and expose private information. This type of privacy violation has a domino effect, resulting in substantial legal and financial consequences as well as decreased productivity for enterprises and governments. Governments have a daunting problem since they must protect networks from these threats while simultaneously considering user rights and privacy legislation. The framework of this paper that decreases the number of system limits and access control methods that are established for BYODs and cloud environments has been presented by the researchers of the study. They also attempted to protect user privacy by implementing Mobile Device Management (MDM) technology. The study's preliminary findings were optimistic, implying that the framework might reduce access control difficulties.","PeriodicalId":158560,"journal":{"name":"International Journal of Electrical and Electronics Research","volume":"113 6","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Evaluation of the Proposed Security Access Control for BYOD Devices with Mobile Device Management (MDM)\",\"authors\":\"Jimshith. V.T, Mary Amala Bai V\",\"doi\":\"10.37391/ijeer.120138\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Bring Your Own Device (BYOD) at Work is a growing practice that has significantly increased network security vulnerabilities. This development has tremendous implications for both businesses and individuals in every organization. As a result of the extensive spreading of viruses, spyware, and other problematic downloads onto personal devices, the government has been forced to examine its data protection legislation. Dangerous apps are downloaded into personal devices without the user's awareness. As a result, both people and governments may suffer disastrous repercussions. In this research, proposed BYODs are troublesome since they can change policies without consent and expose private information. This type of privacy violation has a domino effect, resulting in substantial legal and financial consequences as well as decreased productivity for enterprises and governments. Governments have a daunting problem since they must protect networks from these threats while simultaneously considering user rights and privacy legislation. The framework of this paper that decreases the number of system limits and access control methods that are established for BYODs and cloud environments has been presented by the researchers of the study. They also attempted to protect user privacy by implementing Mobile Device Management (MDM) technology. The study's preliminary findings were optimistic, implying that the framework might reduce access control difficulties.\",\"PeriodicalId\":158560,\"journal\":{\"name\":\"International Journal of Electrical and Electronics Research\",\"volume\":\"113 6\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-03-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Electrical and Electronics Research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.37391/ijeer.120138\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Electrical and Electronics Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.37391/ijeer.120138","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Evaluation of the Proposed Security Access Control for BYOD Devices with Mobile Device Management (MDM)
Bring Your Own Device (BYOD) at Work is a growing practice that has significantly increased network security vulnerabilities. This development has tremendous implications for both businesses and individuals in every organization. As a result of the extensive spreading of viruses, spyware, and other problematic downloads onto personal devices, the government has been forced to examine its data protection legislation. Dangerous apps are downloaded into personal devices without the user's awareness. As a result, both people and governments may suffer disastrous repercussions. In this research, proposed BYODs are troublesome since they can change policies without consent and expose private information. This type of privacy violation has a domino effect, resulting in substantial legal and financial consequences as well as decreased productivity for enterprises and governments. Governments have a daunting problem since they must protect networks from these threats while simultaneously considering user rights and privacy legislation. The framework of this paper that decreases the number of system limits and access control methods that are established for BYODs and cloud environments has been presented by the researchers of the study. They also attempted to protect user privacy by implementing Mobile Device Management (MDM) technology. The study's preliminary findings were optimistic, implying that the framework might reduce access control difficulties.