Bring your own device: security challenges and a theoretical framework for two-factor authentication
In this paper, the security challenges of BYOD are discussed, including existing security solutions which often are too restrictive. Data leakage is one of the security challenges confronting BYOD. Data leakage can occur as a result of stolen, lost or compromised employee devices. When an employee d...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Dorma Trading Est
2016
|
Online Access: | http://psasir.upm.edu.my/id/eprint/55224/1/Bring%20your%20own%20device%20security%20challenges%20and%20a%20theoretical%20framework%20for%20two-factor%20authentication.pdf http://psasir.upm.edu.my/id/eprint/55224/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|