{"title":"当前BYOD安全评估体系:未来方向","authors":"Priscilla Mateko B, Shikun Mateko Z, Ioannis K","doi":"10.4172/2165-7866.1000235","DOIUrl":null,"url":null,"abstract":"There are growing vulnerabilities in Bringing Your Own Device (BYOD) implementation which may not have been fully identified by organisations. It is very difficult to identify, monitor and evaluate the fast growing number of threats and vulnerabilities in a BYOD system, leading to delayed time in preparing and loading a patch which is a periodic process (Static) in most organisation, resulting in risk as the process is not continuous (dynamic) Computer security managers have the task to identify and evaluate these vulnerabilities according to their risk and threat to the network. One database which is known to contain identified vulnerabilities is the Common Vulnerabilities and Exposures (CVE), Common Vulnerabilities Scoring System (CVSS) on the other hand provides numeric scores to each vulnerabilities in the CVE database based on their characteristics and security impact. This assessment is on relevant work to check the various data collected on vulnerability and threat related to BYOD and conduct a vulnerability scoring exercise to report on possible scoring framework.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"8 1","pages":"1-6"},"PeriodicalIF":0.0000,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Current BYOD Security Evaluation System: Future Direction\",\"authors\":\"Priscilla Mateko B, Shikun Mateko Z, Ioannis K\",\"doi\":\"10.4172/2165-7866.1000235\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There are growing vulnerabilities in Bringing Your Own Device (BYOD) implementation which may not have been fully identified by organisations. It is very difficult to identify, monitor and evaluate the fast growing number of threats and vulnerabilities in a BYOD system, leading to delayed time in preparing and loading a patch which is a periodic process (Static) in most organisation, resulting in risk as the process is not continuous (dynamic) Computer security managers have the task to identify and evaluate these vulnerabilities according to their risk and threat to the network. One database which is known to contain identified vulnerabilities is the Common Vulnerabilities and Exposures (CVE), Common Vulnerabilities Scoring System (CVSS) on the other hand provides numeric scores to each vulnerabilities in the CVE database based on their characteristics and security impact. This assessment is on relevant work to check the various data collected on vulnerability and threat related to BYOD and conduct a vulnerability scoring exercise to report on possible scoring framework.\",\"PeriodicalId\":91908,\"journal\":{\"name\":\"Journal of information technology & software engineering\",\"volume\":\"8 1\",\"pages\":\"1-6\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of information technology & software engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4172/2165-7866.1000235\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of information technology & software engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4172/2165-7866.1000235","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Current BYOD Security Evaluation System: Future Direction
There are growing vulnerabilities in Bringing Your Own Device (BYOD) implementation which may not have been fully identified by organisations. It is very difficult to identify, monitor and evaluate the fast growing number of threats and vulnerabilities in a BYOD system, leading to delayed time in preparing and loading a patch which is a periodic process (Static) in most organisation, resulting in risk as the process is not continuous (dynamic) Computer security managers have the task to identify and evaluate these vulnerabilities according to their risk and threat to the network. One database which is known to contain identified vulnerabilities is the Common Vulnerabilities and Exposures (CVE), Common Vulnerabilities Scoring System (CVSS) on the other hand provides numeric scores to each vulnerabilities in the CVE database based on their characteristics and security impact. This assessment is on relevant work to check the various data collected on vulnerability and threat related to BYOD and conduct a vulnerability scoring exercise to report on possible scoring framework.