Uploaded by mohamed khaled

BYOD

advertisement
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/327784045
Bring your own device: a survey of threats and security management models
Article in International Journal of Electronic Business · January 2018
DOI: 10.1504/IJEB.2018.10016225
CITATIONS
READS
0
1,788
2 authors:
Fabricio Rolando Rivadeneira
Glen Dario Rodriguez
Universidad Laica Eloy Alfaro de Manabí (ULEAM)
Universidad Nacional de Ingeniería (Peru)
6 PUBLICATIONS 2 CITATIONS
45 PUBLICATIONS 272 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
incorporation of gamification elements View project
Information Security and Digital Forensics View project
All content following this page was uploaded by Glen Dario Rodriguez on 07 June 2019.
The user has requested enhancement of the downloaded file.
SEE PROFILE
Int. J. Electronic Business, Vol. X, No. Y, XXXX
Bring Your Own Device (BYOD): a Survey of Threats
and Security Management Models.
Fabricio R. Rivadeneira Zambrano*
Universidad Laica Eloy Alfaro de Manabí
Chone 130704, Ecuador
Email: frolando.rivadeneira@uleam.edu.ec
*Corresponding author
Glen D. Rodríguez Rafael.
Facultad de Sistemas e Informatica,
Universidad Nacional Mayor de San Marcos,
Lima, 15081, Peru
Email: grodriguezr@unmsm.edu.pe
Abstract: Bring Your Own Device (BYOD) is used by many organizations for the benefits
offered by allowing the use of mobile devices to perform business tasks, but the following
questions should be analyzed if any organization want to adopt a BYOD environment: What
threats do currently face mobile devices that are being used in BYOD environments? What are
the characteristics of the security models proposed until now in order to manage BYOD? Are
there integral security models with the minimum requirements in order to take full advantage of
BYOD? What are the basic controls that should be taken into account for designing security
policies in a business with a BYOD environment? What are the main differences between
security on BYOD environments vs. security on corporate owned mobile device environments,
regarding how easy is to meet security needs? By giving answers to these questions, we will be
able to have a clear vision of what it takes to adopt BYOD in an organization, its advantages,
disadvantages and the changes that the organization needs to make in order to eliminate security
problems that come along with BYOD. The employees have absolute control of the use and
installation/uninstallation of applications on the mobile device; in security matters this fact is still
the weakest link, and in the majority of the companies it is barely given attention; but in BYOD
environments the employees must be the main firewall in order to avoid security problems.
Keywords: BYOD; Security Risk; Security Policies; Security Management Models; Social
Engineering; Mobile Security.
Reference to this paper should be made as follows: Author(s) (2017) ‘Bring Your Own Device
(BYOD): a Survey of Threats and Security Management Models’, Int. J. Electronic Business,
Vol. X, No. Y, pp.000–000.
Biographical notes: Fabricio Rivadeneira was born in Chone, Ecuador (1975), professor at the
University Laica Eloy Alfaro de Manabí. He got a degree on System Engineering by ULEAM
and a Master on Project Management (2009) by ULEAM. Currently he is in the Doctoral
program of System Engineering at UNMSM, Peru. His research interest is security on mobile
environments.
Glen D. Rodriguez Rafael received his BS in System Engineering from Universidad Nacional de
Ingenieria, Lima, Peru, in 1994, ME in Information and Computer Science Engineering from
Toyohashi University of Technology, Toyohashi, Japan in 2001, and Dr.Eng. in Electronic and
Information Engineering at Toyohashi University of Technology, Toyohashi, Japan in 2004.
From 2006, he has been a Lecturer and later a Professor at Universidad Nacional de Ingenieria,
Lima, Peru. From 2008 until 2013, he has been involved in the Cubesat project of this university
as responsible for the ground station. His research interests are evolutionary algorithms, software
testing, search based software engineering, parallel processing, mobile communications and
information security
1
Introduction
BYOD, is a trend that most companies are beginning to
adopt, (Boon and Sulaiman, 2015) estimate that 200 million
Copyright © 201x Inderscience Enterprises Ltd.
of the 360 million users employ their personal devices for
work-related tasks, due to the benefits they present such as:
customer satisfaction since it creates an increase in
productivity. This is validated by (Page, 2013) who
manifests that 80% of companies that allow a BYOD
240
F.R. Rivadeneira and G.D. Rodríguez
program have seen an increase in productivity. Another
benefit is that companies don’t have to cope with the
devices’ or data plan’s cost. It also makes more time
available for management because employees will always
seek to acquire the latest mobile innovation on the market.
On the implementation of BYOD environments not
everything is benefits; companies also face several
disadvantages in the security field such as challenges on
how to manage employee-owned devices (it should
distinguish the employee-owned devices from the devices of
the organization and manage them separately). Another
challenge is that most devices are owned by employees, the
IT team cannot have complete control over these devices
and applications that are installed; (Hemdi and Deters,
2016) determined in a study that 60% of workers in
businesses allowing BYOD were found to use at least
one free file-sharing application, and 55% of those did
not tell their IT departments about such use; any intrusion
not authorized by the department of IT could cause a risk of
privacy leak on the employees’ side; another disadvantage
is that the devices are always turned on and connected, due
to this reason the vulnerability of malicious attacks increase
along the different channels of communication, the situation
becomes even worse when we consider that the wireless
connection channels in a smart device can be attacked more
easily than the wired channels. The lack or little
enforcement
of BYOD policies is another of the
disadvantages that organizations have; policies are an
important piece in the control of security problems and each
organization must create a policy that suits their needs;
BYOD needs a large number of policies to control and
secure company data.
BYOD is a tendency that companies won’t ignore and in
a short period of time most organizations will allow their
employees to use their mobile devices to carry out the
company’s activities. The following research questions are
asked in order to obtain some insight of how to take the
maximum advantage of the BYOD program:
• What are the threats that mobile devices currently face
while being used in a BYOD environments?
• What are the characteristics of security models in order
to manage BYOD?
• Are there integral safety models with the minimum
requirements to take full advantage of BYOD?
• What are the basic controls that should be taken into
account for designing security policies in companies
with a BYOD environment?
• What are the main differences between security on
BYOD environments vs. security on corporate owned
mobile device environments, regarding how easy is to
meet security needs?
The adaption of BYOD environments has spread rapidly
and continues to transform the way people and
organizations work. The use of mobile devices for both
personal and work activities opens up new security threats.
This article aims to give a panoramic view of BYOD
environments, what their security risks are, what security
management models have been proposed, the policies for
the use of BYOD in corporate settings and future work that
must be done in order to improve the awareness of the
employees so they can become the first security barrier.
2
Background
BYOD is an acronym for "bring your own device," a phrase
used for a scheme based on the idea of allowing employees
to take their own mobile electronic communication device
and use it in the workplace to perform the tasks of the
organization. The scheme is primarily driven by consumer
preference rather than corporate initiative. However, BYOD
has potential benefits for both parties (Bell, 2013). The
Bring Your Own Device phenomenon, means that
employees, business partners and customers are increasingly
accessing information using a web browser on a device not
owned or managed by the organization, this has resulted in
security implications for data leakage, data theft and
regulatory compliance (Morrow, 2012).
BYOD is a scheme that a company adopts, allowing its
employees to bring in and use their own private mobile
devices for their job. What this means is that, this one
device would not only carry the individuals personal data
but also their workplace data (Gladyng, 2013). Employees
can have access to their company’s data at their workplace
and they can also have access to the data outside the
company’s environment (Olalere, et al., 2015). This
enterprise IT policy allows you to use your own devices to
access sensitive corporate data at work through the
company's IT infrastructure.
BOYD is a movement that existed since individuals
began to bring their own particular USB flash drive, or
installed their personally preferred programs in order to
accomplish the tasks that had been assigned to them. In such
cases, over the years, the security of the organizational
resources and data has been achieved through a variety of
technological innovations. These include controlling of the
desktop
environment
by
implementing
different
technologies; for instance, the use of central software-based
policy controls, restriction of the installation of applications,
disabling USB ports, and the monitoring of desired
workstations. (Zahadat, et al., 2015).
It is considered that the moment in which the BYOD
phenomenon appeared was with the arrival of the Apple
iPhone in 2007, which led to a revolution in the field of
consumer technology. Senior executives, condemned for
years to serious and functional terminals like the
BlackBerry, they found a light, tactile, funny device, and
they wanted to take it to the office. In 2009, the BYOD
concept began to be considered when Intel recognized the
importance of employees using their own devices to access
corporate and network resources, but it was until 2011 when
software sellers such as Citrix System shared perceptions
about this new trend (Gajar, et al., 2013).
Since then, the mobility revolution has not stopped,
observing the proliferation of smartphones and tablets with
advanced functionalities in the personal environment of
workers. One of the first companies to support the BYOD
model was IBM, as they recognized the increase in
employees who used their smartphones or personal tablets
in the workplace. IBM offers different solutions divided into
Bring Your Own Device (BYOD): a Survey of Threats and Security Management Models.
"technology solutions" and "services", and almost all focus
mainly on the management of devices in the system.
(Cuevas, et al., 2015).
According to the study by (Lawrence and Francoise,
2014) in the RSA Conference, the adoption of BYOD in
several countries had increased. The study determined that
in India 85% of employees use smartphones to perform
work activities, followed by China with 76%, Brazil with
71%, USA 55%, Canada 47%, UK 38% and Russia 5%.
This study also showed that the rate of use of personal
computers in the same countries are: Brazil 56%, India
55%, China 54%, Canada and USA 47%, U.K. 38% and
Russia 10%. This is proof that there has been an increase of
mobile devices such as Smartphones for performing work
activities.
(Dhingra, 2016) mentions some stats of BYOD as shown
below:
• It is predicted that by 2017, 50% of employers will
require their employees to use their own device for
work purposes.
• By 2018, more than 70% of professionals will carry out
their work on smart personal devices.
• By 2018, there will be more than 1 billion devices used
in BYOD programs around the world.
• Only 30% of companies have approved BYOD
policies.
• 90% of IT professionals express concern about sharing
content through mobile devices.
• 85% of organizations allow employees to bring their
own devices to work.
• More than 50% of the organizations rely on users to
personally protect their devices.
• 53% of information users utilize their own personal
devices for work; install unsupported software; or use
unsupported Internet based services like Dropbox,
Skype, Twitter, or Facebook to help them do their jobs.
• The popularity of the smart devices generates
opportunities for mobile app stores, which in 2016 will
reach 310 billion downloads and 74 billion dollars in
revenue.
2.1
Benefits.
The BYOD implementation offers benefits to the employees
and also to the organizations, among the benefits we have:
Improved employee mobility.- According to the survey
performed by (Schulze, 2016) 61% of employees prefer to
use BYOD because it allows them to be connected from
anywhere and at any time allowing them to perform their
job tasks.
Employee Satisfaction. - allows employees you to use
your favorite mobile device creating an innovative way to
work. Employees are currently dependent on their mobile
devices and are accustomed to their use and management,
allowing them to work in a collaborative and interactive
way.. According to the survey of (Schulze, 2016) 56% of
employees use BYOD for this benefit.
241
Increased employee productivity. - This benefit is aimed
more at the organization because having employees who can
be connected from anywhere, anytime, and satisfied, this
improves productivity.
Cost Reduction.- This benefit is also oriented towards
the organization because it helps reduce the costs of
acquiring devices, and license fees for applications who
require it, because it is assumed by the employees, the
companies can use this savings to provide added value, plus
IT services to employees (Boon and Sulaiman, 2015).
Less device support. - As the ownership of the device is
transferred to the employee, the IT team can spend less time
supporting end users (Pell, 2013).
But everything is not a benefit by adopting BYOD, and
due to this reason it creates a "unique set of challenges for
IT professionals", as it "redefines the relationship between
employees and the IT organization" (Lebek, et al., 2013)
which will be further discussed in section 3.
2.2
BYOD approaches.
For (Boon and Sulaiman, 2015) there are different
approaches for BYOD, which can be: giving managed
enterprise devices to the employee; adding employee’s
owned devices to enterprise devices; replacing employee’s
owned devices to enterprise devices. The most important
objective of BYOD is to provide effective solution to allow
users to enjoy the IT services not just limited to enterprise
owned devices and working hours. Hence, it should allow
anything required to perform work-related tasks are
available in any devices, in private times and accessible in
anywhere either connected remotely by Internet or WLAN
in workplace.
Gajar, et al., 2013) present the following implementation
strategies for corporate mobile management:
Here is your own device (HYOD): In this concept,
devices are provided by the organization. There is total
control in the device by the company. The company will
provide complete support for the device, from the
installation to the configuration and device settings.
Choose your own device (CYOD): In this type of
strategy, the organization offers a series of devices, from
which an employee can choose his own device to use. The
policies aren’t as strict as it was the case of having your own
device and the user has authority to install some specific
applications and software. CYOD is a strategy, while still
embracing the fundamentals of 'consumerization', reduces
the number devices an employee can choose to access
corporate data. In contrast to BYOD, all aspects of the
purchase and device maintenance are assigned to the
employer and not the employee (Pell, 2013).
Bring your own device (BYOD): The employee buys his
device or the organization offers financial help to buy their
own device in which they want to work in the consumer
market. Here the policies are weaker and the organization
has less control over the device. The user can do what they
want and install as many applications as they want, only if
they are complying with the policies of the organization.
On your own device (OYOD): The end user can bring
any device which isn’t supported by the organization. The
242
F.R. Rivadeneira and G.D. Rodríguez
user has the responsibility to administer the device. No
policies are needed to be followed.
3
Threats of Mobile Devices in BYOD
Environments.
Most organizations are totally dependent on their IT systems
for capture, store, process and distribute company
information. This has grown rapidly with the advent of
BYOD. Information security is and has always been a
discipline for mitigate the risks that affect the
confidentiality, integrity and availability of an organization's
IT resources. This discipline has been forced to expand with
the arrival of BYOD, but not necessarily in a predictable
and coherent way. Many organizations aren’t even aware
BYOD is used in their networks; of which many have little
to no technologies and / or policies to address BYOD
(Zahadat, et al., 2015). Studies show that 89% of employees'
mobile devices are connected to a business network; only
10% of these companies know that these devices are even
accessing their network, a cause of concern when
companies are storing vital and confidential data there. In
addition, recent surveys indicate that 34% of mobile device
users store sensitive data on their devices; this fact affects
companies, since a company cannot be sure these sensitive
data aren’t directly related to their business. These security
issues are posed by many of today's devices (Page, 2013).
With the problems raised by the adaption of BYOD, this
paper intends to give an answer to the research question:
What are the threats facing the Mobile devices that are
currently used in BYOD environments? The threats to
companies who implement BYOD, in most cases are the
same vectors of attack performed on desktop computers but
improved, targeted to exploit vulnerabilities and limitations
of mobile devices; another of the threats compromising
mobile devices is a guided and persistent attack, not
launched at random or large number of people, on the
contrary, targeting an specific device. This type of attacks,
with appropriate techniques, enough time and the growing
exploit of emergent technologies (social networks, cloud
computing, among others), can achieve their goal. Among
the threats are:
• Advanced Persistent Threat (APT) is often based on a
common initial vector of attack; it is a clever and
stealthy threat used by a group of highly motivated
perpetrators with the resources to extract and filter
important sensitive data from organizations. ATP
usually involves a prolonged duration method using
covert surveillance in the detection of vulnerabilities, in
order to infiltrate through exploitation vulnerabilities
weaknesses. ATP is often difficult to detect because its
ability to bypass traditional security defenses such as
host firewall, intrusion detection system and other
security systems (Bann, et al., 2015). ATP operations
can take a long time (months or years) to examine and
filter sensitive data from the target without triggering
any detection.
• Social Engineering. It is the art of getting user
information to obtain knowledge about the information
system. Instead of technical attacks on systems, social
•
•
engineers address human beings with access to
information, manipulating them to disclose sensitive
information (Krombholz, et al., 2015). For (Algarni, et
al., 2013) social engineering poses a real threat to many
organizations, companies, governments and individuals.
Sites such as social networks have been identified as
some of the most common means of engineering attack
due to factors that reduce the ability to detect the tricks
of social engineers. 1 in 12 people browse Facebook
while they are at work, either from their own device or
from the company's computer (Orzeszek, 2013).
Attackers can take advantage of social networking sites
in many ways. One way to do this is by establishing a
group that appears to be of public interest, directed to
system administrators or network engineers; by this
way the attackers gain administrators’ trust and can get
valuable information and even the credentials of a key
system in an organization (Kelley and Havilland, 2015).
Malware. Since 2011, the number of mobile malware
families has increased by 58%; malware has increased
more than 10 times between July 2012 and January
2014. These alarming figures suggest that malware
remains the most dangerous and persistent threat for
corporate information. In the context of BYOD,
existing security vulnerabilities in employees' mobile
devices are exploited by malware to steal confidential
information, sabotage networks, or divert financial
transactions. In addition, since the creation of BYOD,
IT departments have lost control of mobile devices,
which means that accidental malware infections cannot
be detected (Flores, et al., 2016). This threat has
become even more versatile and frightening, as it could
hide behind a user’s typical activity on the internet.
They are diversifying and specializing in away from the
traditional infection of links and malicious email
attachments, especially in online social networking
(OSN) domains and mobile devices. For example, there
are social media methods that exploit the functions of
OSN to spread malware through typical activities such
as offering fake gift cards or misleading OSN users to
share attractive videos, websites or messages included
in the malware (Dang-Pham and Pittayachawan, 2015).
Operating System Fragmentation. Google has declared
that only 1.2% of active Android smartphones run the
latest version of Android; this fragmentation causes
support problems and when a IT department allows its
users to bring several types of phones. Several versions
of the same operating system (ex.: Android) on your
network increases the risk and seriousness of security
breaches. Even if only one type of phone is allowed
with one version of the operating system, problems will
arise if the phone/version combination is never updated
by the provider. The IT department will now have to
manage and secure a wide range of devices, including
smartphones and tablets with different operating
systems that have access to corporate data.
Manufacturers constantly bring new software updates
with new features to change the look, feel or
performance of the device, and often a new version of
the operating system changes everything that was
previously safe in the previous version. The new
Bring Your Own Device (BYOD): a Survey of Threats and Security Management Models.
•
•
•
software also has to be adapted to specific device
hardware (radio controllers, Wifi, Bluetooth) and even
on devices that are apparently similar (Rose, 2013). The
Android platform suffers from vulnerabilities that allow
hackers to perform malware attacks, denial of services,
web-launch attacks, create undercover channels, and
privilege attacks (Rose, 2013). Depending on the level
of internal support that IT departments give to the
growing and uncontrolled range of mobile devices
available, these may not be compatible with security
measures of configurations or applications with the
consequence of mobile hardware and operating system
fragmentation. It may prevent the minimum security
requirements can be met to protect the corporate
information.
Theft or loss. Employees take their mobile devices to
many places, which puts them at a greater risk of losing
their device or to have it stolen; when this happens the
user immediately loses use of the device. This could
cause problems such as losing important calls, inability
to handle urgent jobs or other troubles. When the
device is lost or data is stolen, the degree of loss
depends on what data and how it is stored in the device.
In the BYOD environment, a lot of personal and
organizational data is stored in BYOD equipment,
which causes a serious threat (Tu and Yuan, 2012).
According to (Hemdi and Deters, 2016) millions of cell
phones and smartphones are lost or stolen every year. It
is believed approximately 22% of the total number of
mobile devices produced will be lost or stolen during
their lifetime, and more than 50% of them will be never
recovered.
App Store. For (Arabo and Pranggono, 2013) there are
some Android applications that when downloaded from
a third-party market (not the Android market) are able
to access the root functionality of devices ("rooted")
and to turn them into Botnet soldiers without the
explicit consent of the user. The lack of security control
over the applications that appear in various markets of
android apps lead to attack via malware and Botnets. It
was reported recently that Google Play store which has
more than 700,000 apps just passed 15 billion
downloads. (Arabo and Pranggono, 2013)
Security Certificates. According to (Vallina, et al.,
2014) the key component of today's Internet security is
the Transport Layer Security (TLS). This protocol
provides endpoint authentication using the X.509
infrastructure. Trusted certificate authorities sign server
certificates. Customers can verify these certificates by
using a trusted list of CA certificates that are shipped
with their browser or operating system. Because CAs
can sign certificates for any site on the Internet, they
form one of the weakest links in the global trust
hierarchy. When a CA is compromised, the attacker (or
the enforcing entity) can obtain certificates that
habilitate TLS interception attacks on any target
domain. Digital certificates remain a trusted source of
authenticating computers over the Internet, provided
they have been issued by a trusted certification
authority. In fact, mobile devices don’t come with
factory-preloaded AC credentials only, they also allow
•
243
users to add their own or delete existing ones. Given
this, corporate information can be compromised if a
naive employee has been persuaded to add a fake CA to
a mobile device or if an attacker has supplanted a
trusted corporate digital certificate.
BYOD policies and laws. Political gaps is the base of
the majority of safety and security breaches and BYOD
is no exception. For example, corporations normally
require complex passwords on desktop and laptop
computers, but they do not enforce this policy on
BYOD equipment, allowing a simple 4-digit access
code on BYOD devices. (Zahadat, et al., 2015). User
failure to comply with security policies is increasingly
cited as a key security issue in organizations, if users
fail to comply with security policies, security measures
become ineffective (Puhakainen and Siponen, 2010).
4
Characteristics of Security Models for
Managing BYOD.
This section gives an answer to the following question:
What are the characteristics of the security models proposed
to manage BYOD? After reviewing the literature, the
following security models were found; they are presented
along with their most relevant characteristics related to
BYOD environments.
• Mobile Device Management (MDM) remotely
supervises the state of mobile devices in order to
control their functions. An MDM consists of two main
components: an MDM agent which is an application
that is installed on the mobile device and it sends status
and data to the MDM server; and a MDM server which
manages received data and consequently causes
commands on registered mobile device to lock down,
control, encrypt, and enforce policies for them (Eslahi,
et al., 2014). Most existing commercial BYOD security
solutions consist of mobile device management systems
(MDMs) (eg Mobile Iron1, IBM MobileFirst Protect2,
Huawei BYOD3, etc.). The security controls provided
by an MDM solution usually address the behavior of
the device as a whole, for example by applying a
blacklist of unwanted applications, but these controls
are often too thick to capture the actual security policy
of a complex organization (Armando, et al., 2016).
• Mobile Application Management (MAM). MAM system
is a solution used by IT administrators to remotely
install, update, delete, audit and track related business
applications on mobile devices. MDM is different
because it controls mobile devices in the hardware
layer; mobile application management systems monitor
and control certain applications with reference to
policies and requirements of the organization. MAM
features include: Remote Application Provisioning,
Remote elimination and configuration of application,
Remote Application Updates and Backups, Whitelist
and Application Blacklist (Tewari, et al., 2015).
• Mobile Information Management (MIM): This is the
technique that secures corporate information instead of
mobile devices; the main objective of MIM is to
preserve business information in a central location
244
•
•
F.R. Rivadeneira and G.D. Rodríguez
(such as a private cloud) and securely share them
between different endpoints and platforms. MIM only
allows a limited number of trusted applications to
control and manage encrypted corporate data.
Virtualization: BYOD demands a new approach to the
corporate network and the integration of technologies
for its support, one of those technologies is
virtualization. Virtualization helps organizations
implement BYOD environments by centralizing
security and access policies for all of their IT users,
allowing mitigation of risks across the board. Because
the server, desktop and BYOD interactions are
virtualized, it is possible to build a good security
umbrella around all these assets.
Desktop virtualization models are low cost, they
centralize resources, data and security management and
reduce or eliminate the need to transmit data onto
mobile devices, thus reducing the possibility of data
leakage occurrences (Downer & Bhattacharya, 2015).
Virtualization is a software and / or hardware
environment emulation method that runs on the
superior layer of another system. This simulated
environment is called a virtual machine. The virtual
machine is logically equivalent to a physical machine,
and the reason for the widespread application of
virtualization is the ability to run multiple virtual
machines on just one single physical. Within
virtualization we have the hypervisor which is the
hardware platform virtualization software that allows
multiple operating systems on a single device. This
virtualization type is available on some Android
devices because the platform is open. The hypervisor is
used to run two or more instances of the operating
system, giving the ability to run personal applications
and services from a primary partition and enterprise
services / applications on the virtualized operating
system. There are two types of hypervisors. Type 1
hypervisors run directly on system hardware with
multiple virtual systems that use virtual resources
provided by the hypervisor. Type 2 hypervisors run on
a host operating system that provides virtualization
services, such as / O device support and memory
management, where you run virtual systems using the
virtual resources provided by the hypervisor. (Jaramillo,
et al., 2014).
Application Containers for Mobile Devices:
Containerization provides administrators with the
ability to create secure containers on the device within
which all applications and data in the organization are
found. By applying this method, data can be shared
exclusively between applications that are inside the
secure container. This method allows the
implementation of the security policy of the
organization over predetermined secure containers
without affecting the functionality and the private part
of the device data (Perakovic, et al., 2014). There are
three major types of containers according to (Yadav, et
al., 2015): 1) Application-specific containers, also
called pin-in SDK packages, make changes to the
exterior of the user interface, and sometimes customers
do not like it. 2) Neutral application containers use an
application wrapper process to provide security
measures that do not form part of the application source
code. The application wrapper can be deployed in a
short period of time because this container doesn’t
require the change of the original application code. This
gives users the layout of the original application and
consistency for personal space and industry. 3)
Integrated containers allow security and optimization of
business productivity through the use of tools and
applications designed for their integration into the
operating system.
According to the comparative study (Perakovic, et al.,
2014), the most suitable method is the neutral
application container. Due to an uncomplicated
application packaging process, it doesn’t change the
exterior of the application user interface and at the same
time it does not change in the source code.
•T-dominance. It interprets and measures the
security representativeness (is measured by the unique
traits of smartphones: co-location communication
channels in addition to the cellular links, readily
available connectivity information, and regular
mobility/connectivity pattern of users in the enterprise
environment.) with a temporal-spatial structural
property. It is a distributed algorithm that is executed in
distributed form in individual smartphones, solidly
preserving that property. It is called T-dominance
algorithm, where T is a time limit. Each BYOD
smartphone runs the T-dominance algorithm and, based
on potentially obsolete information from nearby
smartphones, estimates its security representativeness.
If a smartphone is considered representative, it becomes
an agent. The algorithm doesn’t need central
coordination, which reduces maintenance overhead for
enterprise IT management, and is less intrusive for
BYOD employees. After executing the algorithm for a
while, the whole set of BYOD smartphones will be
dominated by the agents: each smartphone is an agent
or very likely it is close to an agent with a delay that
doesn’t exceed T. It is a more intrusive and costly
defense mechanism than other methods. Priority based
deployment T dominance provides an adjustable
equilibrium (through T) between the security provision
and the intrusion / cost mechanism (Peng, et al., 2013).
Properties for an algorithm that implements Tdominance-based prioritized defense deployment:
Property 1 (Correctness). The T-dominance
structural property is maintained by the algorithm.
Property 2 (Localization). An agent makes its
activation/deactivation decisions based on its own
status and the connectivity logs from other smartphones
it co-locates with.
Property 3 (Temporal robustness). Property 1 is
achieved even if the connectivity logs obtained from
other smartphones during Wi-Fi co-location is outdated.
T-dominating agents play a specific role in the
deployment of prioritized defense. In the patching
priority, the agents resemble the high-risk population
(prior to immunization) and the deposit of vaccines
(after immunization) in human epidemiology. An agent
makes their activation / deactivation decisions based on
Bring Your Own Device (BYOD): a Survey of Threats and Security Management Models.
•
•
their own status and the connectivity logs of other
smartphones they are on.
Cisco BYOD. It is a Cisco proprietary solution for a
highly managed IT business structure. The architecture
of the Cisco BYOD solution is based on the Cisco
Borderless Network Architecture and assumes the best
practices that apply to the network infrastructure
designs for campus, branch offices, Internet
deployments and home-office deployments. The Cisco
BYOD architecture shows critical components to
enable secure access to any device, easy access to
network, and centralized application of enterprise usage
policies. This robust architecture supports a multitude
of devices, such as employee ownership, business
owners, or guest users attempting to access the network
locally or from remote locations. The Cisco BYOD
Smart solution helps maximize business value by
providing a high quality user experience, security
information and easy attendance. This solution stands
out among other approaches that enable the
implementation of BYOD by the following: superior
technology in every layer, full view of workspace,
validated design with comprehensive support,
integration with third parties, complete services, and
seamless experience with any connection method
(Hallock, et al., 2013).
Brian’s BYOD Model: The use of personal devices to
access corporate applications and data, shows what
happens when there is a conflict between usability and
security. Users speak to themselves, and chose their
preferred program by selecting the tools they find are
the most suitable for their work. And because these are
personal property devices that follow the owner, issues
of device security and remote access should also be
addressed. (Tokuyoshi, 2013), security is addressed by
using the following guidelines:
1) Protecting network traffic: Remote devices
connecting to arbitrary networks may place corporate
data at risk. Without some protection in place to secure
network traffic, the information is about as private as a
postcard, open to anyone to read if they make the effort
to look.
2) Protecting the content of the traffic from
vulnerabilities and exploits: Managed devices have the
benefit of endpoint protection standards that provide a
line of defense against malicious content. Unmanaged
devices may or may not meet those standards, and may
not be adequately protected before getting on the
network. There are two issues that come into play: first,
the endpoint may need better security to protect against
dangerous content; and second, network security
measures can play a larger role in protecting the device
as well.
3) Enforcing application policy: Organizations have
applications they need to protect, and want to ensure
that there are appropriate controls in place for who may
access them and from where. Perhaps the organization
wants to place restrictions on which users may access
the data center applications. Perhaps there are
restrictions that must be in place to ensure that only
corporate issued laptops may access the datacenter.
•
•
245
These types of controls ensure that the protection
around the datacenter adequately models who and what
can access it, and provides an appropriate level of
access for a particular device.
4) Enforcing device policy: The mobile device’s
operating system may have a number of security
features, but the ability to ensure that it is being used
properly is something that is not easily prescribed when
it’s not corporate owned. An increasing number of
organizations are undertaking measures to make
devices policy compliant with enterprise needs through
the use of technology such as Mobile Device
Management (MDM). This can take an unmanaged
device and make it an employee-owned managed
device.
5) Protecting data on the device: Should BYOD
devices be allowed to contain enterprise data? What
measures are in place to secure that data, or destroy the
data in the event of a lost or stolen device? Some see
this as a containment issue, such as using partitioning
and application containers to limit the scope of where
the data goes. Some see this as a matter of data
protection, such as data-level or device level
encryption. Another approach is to first consider what
applications (and data) the device should be allowed to
access in the first place, such as using virtualization to
remotely access an application or desktop without
putting the application data itself on the device.
BRADFORD'S BYOD Model. The process uses the
Network Sentry tool from Bradford Networks; it
provides access to the corporate network and personal
devices according to the rules that are defined. The
Network Sentry policy engine is used to define access
to the network in a very specific way to meet the needs
of different users and groups. Network Sentry is used to
enforce those policies, provide visibility to all network
access, and allow policies to be modified if necessary.
It is an approach that shifts the focus from the
traditional control to a flexible policy-based network
provision that can support personal mobile devices.
Employees can be productive in their preferred devices
without compromising the organizational security
(Bradford, 2013).
BYOD Security Framework (BSF). This framework has
been designed to achieve three objectives. First, spatial
isolation is necessary in order for the personal space
and corporate space to separate from each other, and to
allow policies to be implemented for each of them
individually. Second, corporate data protection is
necessary so that unauthorized access to this data can
become unworkable. This is achieved by encrypting all
corporate data stored on the BYOD device. Finally, the
application of the security policy must be applied so
that devices could be able to comply with the
requirements of the company. BSF defines two entities:
the business side and the device side. The first side is
composed of all corporate resources such as company
servers, Internet gateways and corporate data. On this
side, a network access control mechanism (NAC) is
responsible for providing access control when BYOD
devices attempt to access these resources. This access is
246
•
F.R. Rivadeneira and G.D. Rodríguez
authorized or denied based on corporate policies. In
addition, the NAC has to differentiate between personal
space requests and corporate space requests, which is
achieved through the implementation of certificates for
each of them. To manage corporate policies, a security
policy database is deployed. These policies include
information on how to handle the access request when
dealing with a user space on a BYOD device, which
devices are allowed to access the network, and the
connection parameters. Finally, mobile devices are
managed by integrating an MDM solution, which is
based on the policy database and applies these policies
to BYOD devices (Wang, et al., 2014).
Remote Mobile Display (RMS): This framework meets
all the goals of a safe BYOD environment. To do this,
the enterprise provides the employee with a virtual
machine (VM) with a running mobile operating system,
which is located in the enterprise network. The
employee connects via the mobile device, an RMS
implementation is provided using commonly available
software for an x86 architecture. RMS modifies the
BSF architecture by moving the corporate space located
on the mobile device to the corporate network. In
addition, RMS adds a new component called Corporate
Space Manager, which is used to manage access to
mobile virtual machines located in the corporate
network. Finally, RMS uses the Virtual Network
Computing (VNC) protocol which in return relies on
the Remote Framebuffer (RFB) protocol to allow the
user to access their own corporate space. Like in BSF,
RMS presents a BYOD side and an enterprise side.
RMS uses two elements called Corporate Space
Manager (CSM) and VNC to allow the user to access
the business space. The VNC protocol is based on the
RFB protocol, the RMS system consists of a BYOD
device and an Enterprise side. The BYOD side accesses
the corporate space, located in the corporate network
through the VNC client residing on the device. On the
enterprise side, it contains a security policy
enforcement entity that enforces enterprise policies.
RMS uses its CSM as a proxy server to inspect the
contents of VNC packets and performs actions based on
the content. The employee has access to corporate
resources through the VNC application, thus solving
the problem of storing corporate data on user devices.
However, this system also has its limitations. The VNC
protocol has a cryptographically weak password and
doesn’t protect the observation or data stream
manipulation. In addition, Unicode text transfer is not
compatible with the RFB protocol (Gimenez, 2015).
Table # 1: Security Management in BYOD Environments
Security Model
Mobile Device Management
(MDM)
Mobile Application
Management (MAM).
Mobile Information
Management (MIM)
Virtualization
Application Containers for
Devices
Characteristic
Mobile devices are connected to the corporate network through an encrypted
channel.
It authenticate devices by exchanging certificates from server certified
organizations. With the help of Access Server, MDM can define the correct
access.
It continuously synchronize and backups organizational stored data from devices
and to devices through the synchronization server.
Lock devices, enforce policies on the device and even delete remote and local
data.
Monitors and controls certain applications according to the policies and
requirements of the organization.
Whitelist and blacklist applications.
Application updates and backups.
Remote elimination and configuration of the application.
Remote application provisions
Preserves company information in a central location.
Allows a limited number of trusted applications to control and manage encrypted
corporate data.
Maintain the desktop within the data center.
Streamline the licensing process and reduce licensing liability risks that may go
along with BYOD.
Meets a company's backup, recovery and compliance needs, preventing
employees from storing unique enterprise data on their devices and in cloudbased applications.
Easier management for the IT department. IT doesn't need to manage a large
number of devices, allowing them to focus on data and application management.
Data can be shared exclusively between applications within the secure container.
Provides users with access to all of the organization's data through a single sign
on (SSO).
If some data is compromised, the entire container or that particular application
can be deleted
Assigns the use of various security systems, such as direct renewal or updating of
content to secure containers
Application Level
Technical
Technical
Technical
Technical
Technical
Bring Your Own Device (BYOD): a Survey of Threats and Security Management Models.
T-dominance
Cisco BYOD
Brian’s BYOD Model
10-step process for
BRADFORD'S BYOD
model
BYOD Security Framework
(BSF)
Remote Mobile Display
(RMS)
By using strategic sampling, agents resemble traditional Internet honeypots for
intrusion detection.
The T-dominance structural property is maintained by the algorithm
T-dominating agents play a specific role in the deployment of prioritized defense.
In the patching priority, the agents resemble the high-risk population (prior to
immunization) and the deposit of vaccines (after immunization) in human
epidemiology
An agent makes their activation / deactivation decisions based on their own
status and the connectivity logs of other Smartphones they are on.
Ensure compliance with corporate access policies on any device.
Know what users and devices are connected to the networks.
Minimize the amount of IT resources needed to incorporate new personal devices
into the network.
Workspace productivity applications
Collaborate with any device.
Manages and protect devices and their workspace.
Provide access from anywhere with a seamless connection transfer.
Apply policies to grant access to information, depending on who requests it and
what device to use.
Take the workspace into the device.
Protect network traffic from authorized and unauthorized access.
Protect the traffic content from vulnerabilities through the encryption
mechanism.
Enforce application policy by allowing authorized access for authorized users
and authorized devices.
Device policy enforcement by allowing only security-compatible devices to
access the system.
Data Protection in the device against offline access, theft or malicious acts.
Determine what mobile devices are allowed to access
Determine what OS versions are allowed, only approved and secure OS versions.
Determine what applications are required for security settings configuration.
Determine what groups of employees can use these devices and implement user
device policies.
Determine what network access will be assigned based on who, what, where and
when conditions.
Educate users before purchasing devices for BYOD through communication
policies.
Inventory for reliable and unreliable devices, for administration and for forensic
purposes.
Inventory for trusted and untrusted users
Controlled network access based on risk posture = access provision to the
network.
Assessment and continuous vulnerability correction.
Spatial isolation is necessary for personal space and corporate space to separate
from each other, and to allow policies to be implemented for each of them
individually
Corporate data protection is necessary so that unauthorized access to this data
can become unfeasible, which is achieved by encrypting all corporate data stored
in the BYOD device
Application of the security policy should be applied so that the devices meet the
requirements of the company.
Defines two entities: the business side and the device side.
Mobile devices are managed by integrating an MDM solution, which is based on
the policy database and applies these policies to BYOD devices
Modifies the BSF architecture by moving the corporate space located on the
mobile device to the corporate network.
Provides the employee with a virtual machine (VM) that runs a mobile operating
system,
Adds a new component called Corporate Space Manager, which is used to
manage access to mobile virtual machines located on the corporate network
It uses the Virtual Network Computing (VNC) protocol which in turn is based on
the Remote Framebuffer (RFB) protocol to allow the user to access their own
corporate space
247
Technical
Technical
Technical
Technical
Technical
Technical
248
F.R. Rivadeneira and G.D. Rodríguez
5
Integral Security Model for Managing
BYOD.
Are there integral security models with the minimum
requirements to maximize the advantages of BYOD?
According to the revised literature, there isn’t a model that
allows Integral management of security in BYOD
environments. This is supported by the previous section
describing the security model characteristics and it can be
concluded that each Security Model is designed to partially
manage threats which affect BYOD environments, but there
is not an integral model that tries to manage both the
Technical and Human factors in BYOD environments. In
addition some models do not provide a confidence and
satisfaction degree when using it, causing it to not take
maximum advantage of the benefits that BYOD offers.
Cisco proposes an integral model but is based only on
technical solutions, it does not manage the human part and
leaves aside some other considerations of other models.
Below are the guidelines that must be taken into account
to planning and design an Integral Safety Model and to
make the most out of BYOD.
 Establish close coordination across multiple disciplines
and among stakeholders, supported at the highest levels
of government (Zahadat, et al., 2015).

Understand the business environment, who the users
are and what resources they access. (Zahadat, et al.,
2015).
 BYOD standards in order to ensure BYOD devices are
able to support functional and security requirements.
Organizations should establish requirements that are
aligned with the organization's missions, goals and
objectives (Zahadat, et al., 2015).
 Device Management system (MDM). This must
provide control of applications, data and configuration
parameters for mobile devices, and the device is
provisioned using Over-The-Air (OTA) or other
enrollment process. During provisioning, the device is
installed with any configurations, settings, software,
and certificates necessary to prepare the device for
BYOD (Zahadat, et al., 2015).
 Manage assets, encompasses the full range of processes
and technologies from which BYOD devices are
registered and approved, configuration controlled, and
managed. Asset management includes activities to
formally approve users and devices into the BYOD
program, register devices, install required software,
configurations, and applications to meet organizational
requirements, and to manage the relationship between
the organization, the user, and the device throughout
the BYOD cycle (Zahadat, et al., 2015).
 Controlling the Network Environment. A purpose built
network will permit BYOD devices to access required
organization resources while retaining strategic
intersection points where protective, detective, and
reactive security controls can be placed. Some
technological solutions that are capable of performing
the required functions include: firewalls, access-control
lists, virtual local area networks (VLANs), zoning,
VPN, and application wrapping (Zahadat, et al., 2015).



Governance. Organizational planners will need to
identify the policies, processes, and procedures used to
operate and monitor the organization’s BYOD program.
Governance should include statutory, regulatory, legal,
security, environmental, and operational requirements.
It is critical to understand the limitations of mobile
security technology in order to comprehend, which
aspects of the BYOD security program are technically
enforceable and which are relying solely on policy for
enforcement (Zahadat, et al., 2015).
Network Access Control, establishing and enforcing
network access control (NAC) policies for businessowned Windows laptops can be extended to implement
policies for personal ownership devices (Orans, 2012),
a NAC combination and mobile device management
enforces policies in a BYOD environment. Devices are
not managed by MDM agents and should be limited to
internet access only, or placed in a limited access area
in which they can access an applications subset and
network resources according to the user / group role.
(Harris, et al., 2013) mention that security awareness
and training for most employees is desirable; awareness
of the security problem and training to acquire security
skills. Security professionals in charge of protecting
information systems need a superior level: education,
meaning that expertise is developed for professionals
working within the security discipline.
An obstacle for the introduction of enterprise software
applications on mobile devices is that you can present your
own security issues and compatibility of IT departments.
The tendency for employees to use their own mobile phones
and smartphones, in particular, is unstoppable and the user
is essentially taking control of the company's security
program, a situation that should be addressed by developing
relevant security policies and /or updating existing company
policies to help protect both the company’s network and
legal rights to reduce and liability risks (Bell, 2013). The
next step after applying all technical controls is to design
BYOD policies among the organization's employees, which
is discussed in the next section.
6
Basic Controls for Designing Security
Policies for BYOD Environments.
For (Putri and Hovav, 2014), security information policy
only studied resources that were owned by an organization
so that organizations could have full control of their
resources. In BYOD, resources aren´t owned by the
organization. The devices used to carry out the work are
property of the employees. However, access resources are
owned by the organization, for example network and
information. Any attempt to control an employees' personal
device could create a perceived threat to their freedom in
using their own device. Security policy can be perceived as
a burden and an obstacle to employees’ work because it
restricts the way they use their own devices. 31% of the
companies surveyed by SANS saying that they do not have
policies in place to handle BYOD and a further 26% stating
that they only “sort of” have policies, it is possible to see
how unsecure mobile devices are infiltrating corporate
Bring Your Own Device (BYOD): a Survey of Threats and Security Management Models.
networks. Only 14% of companies feeling that the policies
that they do have in place are very thorough and 49%
feeling that their policies catch some basic threats or none at
all. It can be seen that policies are a large issue that
companies need to be addressing. (Gladyng, 2013).
For (Shumate and Ketel, 2014) BYOD policies are an
integral part of the control and mitigation of the security
problems, although they are often neglected by many
companies as indicated in the SANS survey. Each
organization must create a policy that suits their unique
needs and situations. This policy must be updated on a
regular basis, at least once a year. As technology changes
the policy with respect to this technology type must also
change. The change in the mobile industry is even faster
than in the IT industry in general. The controls that manage
mobile devices need to be updated to address the new risks
that could eventually be created by these changes. With this,
the answer to the fourth research question begins. What are
the basic controls that should be taken into account for the
design of security policies in companies with a BYOD
environment? According to (Madzima, et al., 2014) Policies
have always been regarded as the good starting points for
gaining and exerting control on an enterprise for they
provide the framework for formalizing guidelines for
BYOD adoption and the use of employees owned devices.
When designing, implementing and executing a policy, an
enterprise would know what to do in the event that a device
is lost, an employee resigns from the company, and also
how to manage data and network access for all the BYOD
devices. A good policy should neither be overly restrictive
on how employees may use their device nor overly relaxed
to the extent of granting the enterprise access to the
employee’s personal data. Up next are the basic controls for
designing general policies that all organizations must take
into account, to serve as a starting point in the design of a
specific BYOD policy.
Policies of the Organization:
• Audit Devices. This involves establishing all the
devices you use to manage corporate data, including
those owned by your employee (Puhakainen and
Siponen, 2010).
• Amnesty. The company's IT staff must tell employees
what personal property devices they must bring in order
to be added to company networks and security features
(Puhakainen and Siponen, 2010).
• Adding security. The company's IT staff must configure
all employee-owned devices to meet the company's
security requirements (Puhakainen and Siponen, 2010).
• Employee profiles. It is suggested that in order to
successfully classify employees, the following profiles
should be taken into consideration: Standard user,
advanced user, professional user, guest user (Vignesh
and Asha, 2015).
• Acceptable use policies. Clearly define what is allowed
in term of use of internet and particularly social media
with it fast becoming a popular avenue of attack by
social engineers (Mott, 2013).
Mobile Device User Policies:
• Password. All devices must have a password to access
the device, which must be changed frequently, to create
a password you must avoid consecutive numbers and
249
data related to the employee. According to (Allam, et
al., 2014), Cisco, in a study conducted in 2013, found
that nearly 40% of smartphone users do not have a
password enabled on their device.
• Antivirus and Anti-malware. Use these solutions to
protect the device against malware and viruses, it is
also necessary to activate the automatic update of these
applications so that the mobile device is always
protected (Downer & Bhattacharya, 2015).
• Sensitive Data. Avoid accessing and processing
sensitive data over public wireless networks that don’t
have a password or encryption. (Mott, 2013).
• Lost or stolen devices. The following must be taken
into account: What will the process be for notification
by employees? What are the steps to eliminate access to
the corporate network? What steps will be taken to
eliminate the data stored on the device? Companies
must have a plan in place to handle the lost or stolen
device (Tewari, et al., 2015).
• Encrypt the external memory card. Memory slots are
available on most mobile devices; external memory
cards can be stolen which results in data breach, and
therefore there must be encryption software to encrypt
the external memory card (Vignesh and Asha, 2015).
• GPS lock. It is a lock based on location that can be
applied through GPS; the data can be decrypted and
accessed only from a specific geographical area, such
as the workplace or home (Vignesh and Asha, 2015).
(Madzima, et al., 2014) suggest that the BYOD policy
should provide evidence of employee knowledge and
agreement for the use of their personal devices to carry out
the work of the company. It is also important that the
company's BYOD policy covers areas of potential conflict
between employees and employers
7
BYOD Security vs Corporate owned device
Security
In corporate owned device environments, security
management of the device is managed by the IT department.
The IT Department decides what is installed and what is not
installed, the device model and the version of the OS
installed; it restricts the ability to install applications and
access internet sites. In BYOD environments the device is
owned by the employees, therefore they are the ones in
charge of the security management; the IT department can
apply some preventive, corrective and technical measures of
mobile security management, but it is the employee who has
full control of the device. In table 2, a comparison between
BYOD security and corporate owned device security is
shown, focusing in the ease of meeting security needs.
250
F.R. Rivadeneira and G.D. Rodríguez
Table # 2: Difference between BYOD security and Mobile security
#
1
2
3
4
5
6
7
8
9
10
11
Security Features
Manage extra
applications installed by
users
Manage devices that are
accessing the corporate
network
Separation between
private and business
spheres
Social Network Access
Management
Malware application
management
Ensure that mobile
devices are homogeneous
Ensure that all OS
versions on mobile
devices are
homogeneous.
Complexity of user
support
Device Management in
the event of theft or loss
Enforcement of policies
and laws
Predisposition of users to
training
Ease of
compliance in
BYOD
12
Manage the termination
of the employee's
relationship with the
company
Prevent and mitigate
social engineering attacks
Prevent and mitigate
Advanced Persistent
Threat (APT)
Ensure the privacy of
company data
Low
High
High
Low
High
Low
Low
High
13
Low
Ease of
Compliance
in corporate
owned device
High
Low
High
15
Low
High
Low
High
Low
High
Low
High
Low
High
Table 3 shows the coverage performed by the different
BYOD security models according to the characteristics
presented in table # 2. According to table # 3, it can be
concluded that the BYOD models are focused on technical
solutions, but in the characteristics where the employee has
absolute control of the mobile device there is no model that
allows to manage the security. For example, the use of
social networks by employees can not be managed, which
could easily lead to a social engineering attack or Advanced
Persistent Threat (APT).
High
Low
Low
High
Low
High
Low
High
14
Table # 3: Coverage of BYOD Security Models
Security Model
Mobile
Device
Management (MDM)
Mobile Application
Management (MAM).
Mobile Information
Management (MIM)
Virtualization
Application
Containers
for
Devices
T-dominance
Cisco BYOD
Brian’s BYOD Model
10-step process for
BRADFORD'S
BYOD model
BYOD
Security
Framework (BSF)
Remote
Mobile
Display (RMS)
8
01
02
03
X
X
X
X
X
X
X
X
X
X
X
X
X
X
04
05
Security Features (see table#2)
06
07
08
09
10
11
X
X
X
X
X
X
X
X
Future Work
There are a number of solutions to mitigate the security
risks that are associated with BYOD, from the MDM,
MAM, MIM, Application Containers, Virtualization, but
these partially solve the risks, and if they eventually solve
one, a new gap will eventually open. By reviewing the
literature we notice that an integral model hasn’t been
X
15
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
14
X
X
X
X
X
13
X
X
X
X
12
considered and a future work would be precisely to design
an Integral Model for the security management in BYOD
environments in order to allow to take full advantage of this
trend.
When organizations allow their employees to use their
mobile devices to perform work tasks, it is likely that by
allowing this there is an increase in the use of social
networks while on the job, the danger is that employees can
Bring Your Own Device (BYOD): a Survey of Threats and Security Management Models.
share company data on social networking sites often with
the best of intentions, such as for supportive purposes.
Nearly a third of IT departments suffered data loss in the
2011, while 60% of them suffered two or three data loss,
each with an estimated average cost of 2 to 5% of total
revenue the company (Caldwell, 2012). A future work
would be mechanisms to mitigate the loss of data through
social networks in BYOD environments.
Applying security policies in BYOD environments is
vital to maximize this trend’s benefits of this trend, and to
mitigate the security risks associated with it, some
companies make known these policies through a document
with 20-pages waiting that employees understand it, when
in some cases it was written for regulators, lawyers and
auditors, These documents must be written with language
appropriate to the target audience, and explain the
consequences of noncompliance. According to (Caldwell,
2012), “Training programmes should not be developed by
techies they should be eveloped by marketers” in this way
it will be possible to training employees better with respect
to the security policies, also must be taken into account that
people learn in different ways. User awareness is key and
awareness training should be part of every corporate
security program, so another future work would be to create
awareness programs that allow BYOD employees to apply
security policies in a natural way and easily detect the
attacks you may be experiencing.
9
Conclusions
BYOD has become a good strategy that companies use due
to their great benefits; companies like CISCO and others
create technical solutions and implement policies to help
mitigate the risks that comes with implementing this
strategy. From the review of current literature on security, it
has been found that there are numerous technological
strategies to address the information about the risks of
security but one main factor has been left out and that is the
human factor.
With the study of the literature regarding BYOD, the
following questions could be answered:
• What are the threats that mobile devices currently face
while being used in a BYOD environments? The
following threats were found: Advanced Persistent
Threat (ATP), Social Engineering, Malware, Operating
System Fragmentation, Theft or Loss, Application
Store, False Security Certificates, Policies and BYOD
Laws.
• What are the characteristics of security models in order
to manage BYOD? We found 12 security models for
BYOD environments, of which 11 are based on the
technical management of the mobile device and its
connections. Only the BYOD Policy Management
Model has characteristics oriented to the human factor.
• Are there integral safety models with the minimum
requirements to take full advantage of BYOD?
According to the revised literature, there is no model
that allows a comprehensive management of security in
BYOD environments, because each security model is
designed to manage some of the threats that affect
BYOD, but there is no integral model that tries to
•
•
9
251
prevent both the technical and human factors by which
mobile devices can be compromised.
What are the basic controls that should be taken into
account for designing security policies in companies
with a BYOD environment? The basic controls that
should be considered for the design of BYOD policies
are classified into organization policies’ controls, such
as: audit devices, amnesty, security addition, employee
profiles, acceptable use policies; and mobile device
user policies’ controls such as: password, antivirus and
anti-malware, sensitive data, lost or stolen devices,
encryption of external memory card, GPS lock. These
controls serve as a starting point for designing a
specific BYOD policy for any organization.
What are the main differences between security on
BYOD environments vs. security on corporate owned
mobile device environments, regarding how easy is to
meet security needs? There is 15 security features that
show a complete mistmatch between the ease of
compliance in BYOD vs. ease of compliance in
corporate owned mobile devices. There are 11 features
that are easier to meet in corporate owned mobile
devices than in BYOD. Most research regarding mobile
security has been done with the traditional corporate
owned device environment in mind, therefore,
additional research into BYOD security management
and models is needed.
References
Algarni, A., Xu, Y., Chan, T., and Tian, Y.-C. (2013). Social
engineering in social networking sites: Affect-based
model. 8th International Conference for Internet
Technology and Secured Transactions (ICITST-2013).
Allam, S., Flowerday, S. V., and Flowerday, E. (2014).
Smartphone information security awareness: A victim of
operational pressures. Computers & Security, pp.56-65.
Arabo, A., and Pranggono, B. (2013). Mobile Malware and Smart
Device Security: Trends, Challenges and Solutions. 19th
International Conference on Control Systems and
Computer Science.
Armando, A., Costa, G., Merlo, A., Verderame, L., and Wrona, K.
(2016). Developing a NATO BYOD security policy.
International Conference on Military Communications
and Information Systems (ICMCIS), pp.1-6.
Bann, L. L., Mahinderjit, M., and Samsudin, A. (2015). Trusted
Security Policies for Tackling Advanced Persistent
Threat via Spear Phishing in BYOD Environment.
Procedia Computer Science, pp.129–136.
Bell, M. (2013). Considerations When Implementing a BYOD
Streategy. The Role of IS Assurance & Security
Management, pp.19-21.
Boon, G. L., and Sulaiman, H. (2015). A Review on
Understanding of BYOD Issues, Frameworks and
Policies. The 3rd National Graduate Conference
(NatGrad2015), Universiti Tenaga Nasional, Putrajaya
Campus, 272-277.
Bradford, N. (2013). Ten Steps to Secure BYOD. White Paper.
Caldwell, T. (2012). Training – the weakest link. Computer Fraud
& Security, pp.8-14.
Cuevas, P. d., A.M, M., J.J, M., P.A, C., P., G.-S., & A, F and.-A.
(2015). Corporate security solutions for BYOD: A novel
user-centric and self-adaptive system. Computer
Communications, pp.83–95.
252
F.R. Rivadeneira and G.D. Rodríguez
Dang-Pham, D., and Pittayachawan, S. (2015). Comparing
intention to avoid malware across contexts in a BYODenabled Australian university: A Protection Motivation
Theory approach. Computers & Security, pp.281–297.
Dhingra, M. (2016). Legal Issues in Secure Implementation of
Bring Your Own Device (BYOD) . Procedia Computer
Science.
Downer, K., and Bhattacharya, M. (2015). BYOD Security: A
New Business Challenge. Conference: Proceedings of
The 5th International Symposium on Cloud and Service
Computing (SC2 2015), IEEE CS Press.
Eslahi, M., Naseri, M. V., Hashim, H., Tahir, N., and Saad, E. H.
(2014). BYOD: Current State and Security Challenges.
Computer Applications and Industrial Electronics
(ISCAIE), 2014 IEEE Symposium on.
Flores, D. A., Jhumka, A., and Qazi, F. (2016). Bring Your Own
Disclosure: Analysing BYOD Threats to Corporate
Information. Conference: 15th IEEE International
Conference on Trust, Security and Privacy in Computing
and Communications (IEEE TrustCom-16), At Tianjin,
China.
Gajar, P. K., Ghosh, A., and Rai, S. (2013). Bring Your Own
Device (Byod): Security Risks And Mitigating
Strategies. Journal of Global Research in Computer
Science, pp.62-70.
Gimenez, S. M. (04 de 2015). Remote Mobile Screen (RMS): An
Approach For Secure Byod Environments. Computer
Science and Engineering: Theses, Dissertations, and
Student
Research.
http://digitalcommons.unl.edu/computerscidiss/86/?
utm_source=digitalcommons.unl.edu
%2Fcomputerscidiss
%2F86&utm_medium=PDF&utm_campaign=PDFCover
Pages
Gladyng, C. (2013). BYOD: Can It Harm Your Business? The
Role of IS Assurance & Security Management, 31-33.
Hallock, Z., Johnston, J., Macias, F., Saville, R., and Tenneti, S.
(2013). Cisco Bring Your Own Device (BYOD). CISCO.
Harris, M. A., Patten, K., and Regan, E. (2013). The Need for
BYOD Mobile Device Security Awareness and Training.
Proceedings of the Nineteenth Americas Conference on
Information Systems, Chicago, Illinois.
Hemdi, M., and Deters, R. (2016). Data Management in Mobile
Enterprise Applications. Procedia Computer Science,
pp.418 – 423.
Jaramillo, D., Newhook, R., and Nassar, N. (2014). Techniques
and real world experiences in mobile device security.
SOUTHEASTCON 2014, IEEE.
Kelley, P., and Haviland, J. (2015). Leveraging Social Networks
and BYOD for Reverse Social Engineering Attacks on
Corporate Networks. Academia.edu.
Krombholz, K., Hobel, H., Huber, M., and Weippl, E. (2015).
Advanced social engineering attacks. Journal of
Information Security and Applications, pp.113–122.
Lawrence, D., and Francoise, G. (2014). Practical Legal Aspects of
BYOD. RSA Conference.
Lebek, B., Degirmenci, K., and Breitner, M. H. (2013).
Investigating the Influence of Security, Privacy, and
Legal Concerns on Employees' Intention to Use BYOD
Mobile Devices. Proceedings of the Nineteenth
Americas Conference on Information Systems, Chicago,
Illinois.
Madzima, K., Moyo, M., and Abdullah, H. (2014). Is Bring Your
Own Device an institutional information security risk for
small-scale business organisations? Information Security
for South Africa.
Morrow, B. (2012). BYOD security challenges: control and protect
your most sensitive data. Network Security, 5–8.
View publication stats
Mott, G. (2013). Social Engineering and how it Affects Your
Business. The Role Of Is Assurance & Security
Management.
Olalere, M., Taufik, M., Mahmod, R., and Abdullah, A. (2015). A
Review of Bring Your Own Device on Security Issues.
SAGE Open.
Orans, L. (2012). Securing BYOD With Network Access Control,
a Case Study. SANS Institute.
Orzeszek, M. (2013). Social Engineering and Business Practice.
The Role of IS Assurance & Security Management,
pp.87-89.
Page, L. (2013). The Trade Offs for Bring Your Own Devices.
THE Role Of Is Assurance & Security Management,
pp.91-94.
Pell, L. C. (2013). BYOD: Implementing the Right Policy. The
Role Of Is Assurance & Security Management, pp.95-98.
Peng, W., Li, F., Han, K. J., Zou, X., and Wu, J. (2013). Tdominance: Prioritized Defense Deployment for BYOD
Security. IEEE Conference on Communications and
Network Security (CNS).
Perakovic, D., Husnjak, S., and Cvitić, I. (2014). Comparative
analysis of enterprise mobility management systems in
BYOD environment. Conference: Research Conference
In Technical Disciplines RCITD, At Zilina, Slovak
Republic.
Puhakainen, P., and Siponen, M. (2010). Improving Employees’
Compliance Through Information Systems Security
Training: An Action Research Study. MIS Quarterly,
pp.757-778.
Putri, F. F., and Hovav, A. (2014). Employees’ Compliance with
BYOD Security Policy: Insights from Reactance,
Organizational Justice, and Protection Motivation
Theory. Association for Information Systems.
Rose, C. (2013). BYOD: An Examination Of Bring Your Own
Device In Business. Review of Business Information
Systems, pp.65-69.
Schulze, H. (2016). Byod & Mobile Security. SPOTLIGHT
REPORT.
Shumate, T., and Ketel, M. (2014). Bring Your Own Device:
Benefits,
risks
and
control
techniques.
SOUTHEASTCON 2014, IEEE.
Tewari, A., Nagdev, P., and Kiran, I. (2015). BYOD:Usability.
International Journal of Computer Science and
Information Technologies (IJCSIT), 2081-2814.
Tokuyoshi, B. (2013 ). The security implications of BYOD.
Network Security, pp.12-13.
Tu, Z., and Yuan, Y. (2012). Understanding User's Behaviors in
Coping with Security Threat of Mobile Devices Loss and
Theft . 45th Hawaii International Conference on System
Sciences.
Vallina, N., Amann, J., Kreibich, C., Weaver, N. and Paxson, V.
(2014). A Tangled Mass: The Android Root Certificate
Stores. Proceedings of the 10th ACM International on
Conference on emerging Networking Experiments and
Technologies, pp.141-148.
Vignesh, U., and Asha, S. (2015). Modifying Security Policies
Towards BYOD. Procedia Computer Science, 511-516.
Wang, Y., Wei, J., and Vangury, K. (2014). Bring your own device
security issues and challenges. Conference: 2014 IEEE
11th Consumer Communications and Networking
Conference (CCNC).
Yadav, S., Ganguly, U., Suman, S., and Puri, P. (2015). Threats
and Vulnerabilities of BYOD and Android. International
Journal of Research, pp.997-1003.
Zahadat, N., Paul, B., Timothy, B., and Olson, B. A. (2015).
BYOD security engineering: A framework and its
analysis. Computers & Security, pp.81-99.
Download