Thursday 25 May 2023

Security Issues Associated with Bring Your Own Device (BYOD): A Narrative Review | Chapter 10 | Research Highlights in Science and Technology Vol. 2

 This study is a narrative review that proposed at exploring the benefits, risks, and procedure controls of Bring Your Own Device (BYOD) for maximum and effective BYOD adoption. BYOD is a example where representatives use their personal schemes such as Smartphones, tablets, laptops, etc., to access arrangements’ enterprise money such as electronic mail, file servers, and database contents and networks. Significant practical evidence from literature told that 82% of organizations have a BYOD program, while 68% of arrangings see a jump in output after changing to BYOD. Despite these important honors, numerous investigations have proved that threats and attacks on institution data and resources: secrecy, integrity, and chance are the greatest safety concern in BYOD environment. In this study, the authors adopted a narrative review methods. A search, using keywords, was administered and fifty-five peer-inspected journal papers inside the last 5 years concerning this study were identified. These journals emanated Pro Quest databases, ScienceDirect, Taylor and Francis, Crossref.com, Walden University collection of scholarly and peer-inspected journals, and other accompanying texts. Inclusion and exclusion tests were applied, followed by a character appraisal of the picked articles, before dossier were extracted.  Results show that good BYOD policies, directions, and practices coupled with good controls and administration may thwart security breaches on employees' and arrangements' devices and money. Results also show that it is likely to use machine learning approaches to handle threats and attacks to a degree persistent warnings, data outflow, and data theft, dismissal of service (DOS) attack, interruption attack, and untrusted network in BYOD environment. Findings may definitely impact and equip institutions and employees accompanying proven information for favorable security and risk administration programs that may increase shared trust and a healthy BYOD adoption surroundings.


No comments:

Post a Comment