Bring your own device: security challenges and a theoretical framework for two-factor authentication

In this paper, the security challenges of BYOD are discussed, including existing security solutions which often are too restrictive. Data leakage is one of the security challenges confronting BYOD. Data leakage can occur as a result of stolen, lost or compromised employee devices. When an employee d...

Full description

Saved in:
Bibliographic Details
Main Authors: Olalere, Morufu, Abdullah, Mohd Taufik, Mahmod, Ramlan, Abdullah, Azizol
Format: Article
Language:English
Published: Dorma Trading Est 2016
Online Access:http://psasir.upm.edu.my/id/eprint/55224/1/Bring%20your%20own%20device%20security%20challenges%20and%20a%20theoretical%20framework%20for%20two-factor%20authentication.pdf
http://psasir.upm.edu.my/id/eprint/55224/
Tags: Add Tag
No Tags, Be the first to tag this record!