Analysis of security controls for BYOD (Bring Your Own Device)
AuthorRivera, David; George, Geethu; Peter, Prathap; Muralidharan, Sahithya; Khanum, Sumaya
AffiliationEngineering - Computing and Information Systems
Document TypeWorking Paper
CitationsRivera, D., George, G., Peter, P., Muralidharan, S., & Khanum, S. (2013). Analysis of security controls for BYOD (Bring Your Own Device). Melbourne, The University of Melbourne.
Access StatusOpen Access
© 2013 The authors
This paper researches on the impact of Bring Your Own Devices (BYOD) to Organizational security. It examines the principal threats and control mechanisms covered in academic and industry literatures. The paper also identifies key areas where organizations can implement security controls in order to reduce BYOD related security threats. An analysis of the key risks and how existing control mechanisms address them is also conducted.
KeywordsBYOD; security controls; NAC; MDM; MAM; virtualization
- Click on "Export Reference in RIS Format" and choose "open with... Endnote".
- Click on "Export Reference in RIS Format". Login to Refworks, go to References => Import References