The Library
Bring your own disclosure : analysing BYOD threats to corporate information
Tools
Flores Armas, Denys, Qazi, Farrukh and Jhumka, Arshad (2016) Bring your own disclosure : analysing BYOD threats to corporate information. In: 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 23-26 Aug 2016. Published in: 2016 IEEE Trustcom/BigDataSE/ISPA pp. 1008-1015. ISBN 9781509032051. doi:10.1109/TrustCom.2016.0169 ISSN 2324-9013.
|
PDF
WRAP-Bring-disclosure-corporate-Flores-2017.pdf - Accepted Version - Requires a PDF viewer. Download (518Kb) | Preview |
Official URL: http://dx.doi.org/10.1109/TrustCom.2016.0169
Abstract
Mobile device consumerisation has introduced the Bring-Your-Own-Device (BYOD) trend to the organisational context, allowing employees to work using their personal devices. However, as personal mobile devices are perceived as less secure than those provided by the organisation, BYOD has risen security concerns about corporate information being accessed by mobile devices from inside and outside the corporate perimeter. Moreover, this uncontrolled mobile device activity makes it difficult to differentiate external (outsider) malicious activity from reckless/naive employee (insider) behaviour, preventing effective correlation of unauthorised actions with the perpetrators. In this paper, a STRIDE-based BYOD Threat Model is proposed to analyse BYOD Threat Interactions from inside and outside the corporate perimeter. Our research contributes to a better understanding and awareness about the influence of BYOD Threats on disclosure and contamination of corporate information, encouraging future work in the field of BYOD security and digital forensics in order to protect information and manage an increasing number of evidence sources.
Item Type: | Conference Item (Paper) | ||||||
---|---|---|---|---|---|---|---|
Subjects: | H Social Sciences > HD Industries. Land use. Labor | ||||||
Divisions: | Faculty of Science, Engineering and Medicine > Science > Computer Science | ||||||
Library of Congress Subject Headings (LCSH): | Confidential business information, Smartphones, Employees -- Security measures | ||||||
Journal or Publication Title: | 2016 IEEE Trustcom/BigDataSE/ISPA | ||||||
Publisher: | IEEE | ||||||
ISBN: | 9781509032051 | ||||||
ISSN: | 2324-9013 | ||||||
Book Title: | 2016 IEEE Trustcom/BigDataSE/ISPA | ||||||
Official Date: | 9 February 2016 | ||||||
Dates: |
|
||||||
Page Range: | pp. 1008-1015 | ||||||
DOI: | 10.1109/TrustCom.2016.0169 | ||||||
Status: | Peer Reviewed | ||||||
Publication Status: | Published | ||||||
Date of first compliant deposit: | 5 May 2017 | ||||||
Date of first compliant Open Access: | 9 May 2017 | ||||||
Funder: | Ecuador Secretaría Nacional de Educación Superior, Ciencia, Tecnología e Innovación [Ecuadorian secretariat of higher education, science, technology and innovation] (SENESCYT) | ||||||
Conference Paper Type: | Paper | ||||||
Title of Event: | 2016 IEEE Trustcom/BigDataSE/ISPA | ||||||
Type of Event: | Conference | ||||||
Location of Event: | Tianjin, China | ||||||
Date(s) of Event: | 23-26 Aug 2016 |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year