Bring your own device: security challenges and a theoretical framework for two-factor authentication
In this paper, the security challenges of BYOD are discussed, including existing security solutions which often are too restrictive. Data leakage is one of the security challenges confronting BYOD. Data leakage can occur as a result of stolen, lost or compromised employee devices. When an employee d...
Saved in:
Main Authors: | Olalere, Morufu, Abdullah, Mohd Taufik, Mahmod, Ramlan, Abdullah, Azizol |
---|---|
Format: | Article |
Language: | English |
Published: |
Dorma Trading Est
2016
|
Online Access: | http://psasir.upm.edu.my/id/eprint/55224/1/Bring%20your%20own%20device%20security%20challenges%20and%20a%20theoretical%20framework%20for%20two-factor%20authentication.pdf http://psasir.upm.edu.my/id/eprint/55224/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A review of bring your own device on security issues
by: Olalere, Morufu, et al.
Published: (2015) -
Access control framework in a bring your own device environment
by: Morufu, Olalere
Published: (2016) -
A systematic review of Bring Your Own Device (BYOD) authentication technique
by: Jamal, Fara, et al.
Published: (2020) -
Enhanced Bring your Own Device (BYOD) environment security based on blockchain technology
by: Jamal, Fara, et al.
Published: (2018) -
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)