Bring Your Own Disclosure: Analysing BYOD Threats to Corporate Information

被引:0
作者
Flores, Denys A. [1 ,2 ]
Qazi, Farrukh [1 ]
Jhumka, Arshad [1 ]
机构
[1] Univ Warwick, Dept Comp Sci, Coventry, W Midlands, England
[2] Escuela Politec Nacl, DICC, Quito, Ecuador
来源
2016 IEEE TRUSTCOM/BIGDATASE/ISPA | 2016年
关键词
BYOD; threat model; STRIDE; disclosure; contamination; insider; outsider; attack; forensics;
D O I
10.1109/TrustCom.2016.167
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile device consumerisation has introduced the Bring-Your-Own-Device (BYOD) trend to the organisational context, allowing employees to work using their personal devices. However, as personal mobile devices are perceived as less secure than those provided by the organisation, BYOD has risen security concerns about corporate information being accessed by mobile devices from inside and outside the corporate perimeter. Moreover, this uncontrolled mobile device activity makes it difficult to differentiate external (outsider) malicious activity from reckless/naive employee (insider) behaviour, preventing effective correlation of unauthorised actions with the perpetrators. In this paper, a STRIDE-based BYOD Threat Model is proposed to analyse BYOD Threat Interactions from inside and outside the corporate perimeter. Our research contributes to a better understanding and awareness about the influence of BYOD Threats on disclosure and contamination of corporate information, encouraging future work in the field of BYOD security and digital forensics in order to protect information and manage an increasing number of evidence sources.
引用
收藏
页码:1008 / 1015
页数:8
相关论文
共 43 条
  • [1] ACSC, 2015, THREAT REP
  • [2] [Anonymous], 2014, HARVARD BUSINESS REV
  • [3] Aphale M., 2015, INT J ENG RES TECHNO, V4
  • [4] Ashford W., 2012, COMPUTER WEEKLY, P7
  • [5] Bamforth R., 2013, COMPUTER WEEKLY
  • [6] BYOD - Popular and problematic
    [J]. Beckett, Phil, 1600, Elsevier Ltd (2014): : 7 - 9
  • [7] Bradley N., 2015, IBM SECURITY INTELLI
  • [8] CG, 2016, BYOD TREND WHAT IT M
  • [9] Securing BYOD
    Chang, J. Morris
    Ho, Pao-Chung
    Chang, Teng-Chang
    [J]. IT PROFESSIONAL, 2014, 16 (05) : 9 - 11
  • [10] Corporate security solutions for BYOD: A novel user-centric and self-adaptive system
    de las Cuevas, P.
    Mora, A. M.
    Merelo, J. J.
    Castillo, P. A.
    Garcia-Sanchez, P.
    Fernandez-Ares, A.
    [J]. COMPUTER COMMUNICATIONS, 2015, 68 : 83 - 95