Bring Your Own Device (BYOD): Threats, Vulnerabilities, Adoption

  • 2015

Bring Your Own Device (BYOD): Threats, Vulnerabilities, Adoption

Author:
Mulumebet Hussein
Abstract:

This research paper will begin by studying the current state of the BYOD trend, and will identify some functions that require careful consideration before adoption. Understanding data movement and security is discussed as a fundamental focus to applying holistic information assurance (IA).

It is imperative to comprehend data flow for each industry from end-point to end-point. Analyzing what data needs securing, where data is, when data is accessed, and who has access to that data are all questions to address before senior management adopts BYOD program. This leads into review of a dynamic IT infrastructure that is agile with fast-changing technology and able to adapt and circumvent risks while mitigating threats and vulnerabilities. We conclude by discussing and identifying the urgent need for a BYOD policy that is comprehensive and industry-specific with added value to a business mission.