Research Report: Security threats related to BYOD devices and countermeasures (1200 Words) USE IEEE research articles to complete the assessments. · Abstract (Abstract will provide an overview of your...

1 answer below »
Word file attached. Please read each and every step carefully before answering the questions.


Research Report: Security threats related to BYOD devices and countermeasures (1200 Words) USE IEEE research articles to complete the assessments. · Abstract (Abstract will provide an overview of your task, along with key security challenges in that area and why you have selected this to be your area of research.) · Introduction · Overview of the technology involved · Relevant technologies and applications of those technologies · Highlighting the challenges/problems in your chosen research area · Identification of any gaps in the literature by: · discussing areas/issues that you believe have been addressed in the current literature; · highlighting areas/issues that have not been addressed or adequately addressed; and · discussing your view(s) on the issue(s) that you see as being critical. · Summarize the future research directions based on the identified gaps · Reference List (With In- text citation in the research report) To accomplish the above task, you are expected to read and critically evaluate recent research in your selected research area by citing a minimum of 5 research articles. Students are required to use the research articles from well known and reputed research portals such as IEEE(in particular to be used), ACM, Springer, Wiley etc. Please note Wikipedia and general blogs will not be considered as reputable citations.
Answered Same DayApr 20, 2021ITC595Charles Sturt University

Answer To: Research Report: Security threats related to BYOD devices and countermeasures (1200 Words) USE IEEE...

Soumi answered on Apr 22 2021
164 Votes
Running Head: THREATS RELATED TO BYOD DEVICES AND COUNTERMEASURES        1
THREATS RELATED TO BYOD DEVICES AND COUNTERMEASURES         9
SECURITY THREATS RELATED TO BYOD DEVICES AND COUNTERMEASURES
Abstract
In the current report the use of Bring Your Own Device technology, better termed as BYOD has been discussed in the background
of the security breaches it possesses and countermeasures to resolve the issues. The current report shows that BYOD despite being a profiting proposition has serious data and privacy breach potentials, which makes its application difficult. However, in the current report BYOD and countermeasures for resolving its data and privacy breach issues could lead to future benefit for business organisations therefore, the topic has been selected.
The discussion of the countermeasures in the discussed literature has helped in hinting at how the BYOD can be optimised in case issues arise in the organisation in which it is adapted. However, it is also noticed that that the literature although hinted at future application in many sectors and industries, did not provide any concrete details, which is a major limitation of the current literature. BYOD is a beneficial technology, especially when placed in context of start-ups.
Table of Contents
Introduction    4
Overview of BYOD Technology    4
Application of the BYOD Technology    5
The Problems of Using BYOD Technology    6
Identification of the Gaps in the Literature    7
Future Direction of BYOD    7
References    9
Introduction
    BYOD refers to Bring Your Own Device, a corporate policy, in which employees of an organisation are allowed to bring their devices to the workplace and use them for their work at the workplace. The idea of BYOD caters its significance from the fact that it reduces cost or organisational purchases and increases the scope of employee performance for the fact that employees know their personal devices better and can naturally perform better on them.
However, similar to the increasing significance and benefits, perceived from the angle of productivity, the security breaches and issues have become alarming concerns for the organisations using BYOD policies in their functional frame of business. Considering the ever-increasing market continuation and the need for lower internal cost, BYOD cannot be rejected, therefore, increasing measures, to increase the security standards and resolve the issues, currently observed in the industry, must be discussed and assessed properly, which the current report aims at presenting.
Overview of BYOD Technology
    The BYOD technology is based on a few major aspects of employee behaviours, namely- the tendency of using personal devices at work, having higher comfort level of using personal devices, investing higher amount of money for personalised higher quality devices that are more reliable that industrial devices purchased at the workplace for anonymous usage. As mentioned by Ogie (2016), business organisations, especially those in the Information Technology Industry observed that their employees have the tendency of using their personal laptop and mobile more than official ones and have a natural tendency of maintaining the quality of the products purchased from their own money.
The...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here