Corpus ID: 61038582

An Approach to Implement Bring Your Own Device (BYOD) Securely

@inproceedings{Gupta2013AnAT,
  title={An Approach to Implement Bring Your Own Device (BYOD) Securely},
  author={Vishal Gupta and Deepak Sangroha and Lovekesh Dhiman},
  year={2013}
}
BYOD (Bring Your Own Device) is a business policy to allow employees to bring their own devices at their work. The same device is used in and out of the corporate office and during outside use, it may be connected to insecure internet and critical corporate data become public. This can be a big threat to the office as well as business strategies and future policies are derived from this data. In this paper an approach is explained to guard against this type of threat and to secure the corporate… Expand
Analysis of BYOD security frameworks
Bring Your Own Device: An overview of risk assessment
  • R. Ogie
  • Business, Computer Science
  • IEEE Consumer Electronics Magazine
  • 2016
Bring Your Own Device
Comparative study on bring your own technology [BYOT]: Applications & security
  • A. Mishra, Kuntesh K. Jani
  • Engineering
  • 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)
  • 2015

References

SHOWING 1-4 OF 4 REFERENCES
Lovekesh Dhiman He had done his BTECH (IT) From Guru Gobind Singh Indraprastha University
  • And Currently Pursuing MTECH IN Information Security from Ambedkar Institute of Advanced Research & Technologies
  • 2008
Computer Science From Kurukshetra University
  • 2007 and Currently Pursuing MTECH from Ambedkar Institute of Advanced Research & Technologies Guru Gobind Singh Indraprastha University M. Tech., in Information Security
University of Oregeon Factors for consideration when developing a bring your own device(BYOD)
    White paper BYOD: On-boarding and Securing Devices in Your Corporate network