skip to main content
research-article

A Proactive Procedure to Mitigate the BYOD Risks on the Security of an Information System

Published:06 February 2015Publication History
Skip Abstract Section

Abstract

During the last ten years, security attacks on information systems have led to a huge number of data breaches all over the globe. Information security risks are causing massive damage to organizations. The security risk could be costlier to handle if not given due attention. We need to build a security culture in which everyone can recognize and evaluate the risks. In the current scenario the risks due to BYOD have emerged as a new challenge to information-security practitioners. The present study focuses on evaluating BYOD risks and their causes well before they become a threat to an organization. A new procedure is proposed to tackle the threats from BYOD and an empirical analysis is provided for validation of the proposed procedure.

References

  1. A. Atzeni and A.Lioy. Why to adopt a security metric? A brief survey. In QoP-2005: Quality of Protection workshop, pages 1--12, 2005.Google ScholarGoogle Scholar
  2. A. Beautement, "Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security," Managing Information Risk and the Economics of Security, M.E. Johnson, ed., Springer Science+Business Media, 2009, pp. 141--162.Google ScholarGoogle Scholar
  3. Bulgurcu, B., Cavusoglu, H., and Benbasat, I.2010. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information System Awareness, Management Information Systems Quarterly (2010), pp. 523--548. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C. Woody. Applying OCTAVE: Practitioners report. 2006. Carnegie Mellon University.Google ScholarGoogle Scholar
  5. Campbell, K., Gordon, L. A., Loeb, M. P., and Zhou, L.(2009).The economic cost of publicly announced information security breaches: Empirical evidence from the stock market. Journal of Computer Security, Vol. 17, 2009, pp. 431--448. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Flechais, I., M.A. Sasse, and S.M.V. Hailes. Bringing security home: a process for developing secure and usable systems. in Proceedings of the 2003 workshop on New security paradigms. 2003. Ascona, Switzerland: ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Guarro, S.B.1987. Principles and procedures of the LRAM approach to information systems risk analysis and management. Computers and Security, vol. 6, 1987, pp. 493--504. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Joseph Migga Kizza: A Guide to Computer Network Security, Springer, 2008, pp 112--115, http://en.wikipedia.org/wiki/Timeline_of_computer_ security_hacker_history Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Julia H. Allen, Sean Barnum, Robert J. Ellison, Gary McGraw, Nancy R. Mead: Software Security Engineering: A Guide for Project Managers, Addison Wesley Professional, 2008, pp 6--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Kazman, R.; Nord, R. L.; & Klein, M. A Life-Cycle View of Architecture Analysis and Design Methods (CMU/SEI-2003-TN-026). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2003.Google ScholarGoogle Scholar
  11. L.A., Gordon, M. P., Loeb, and W. Lucyshyn.2010. CSI/FBI computer crime and security survey. Computer Security Institute (San Francisco 2010).Google ScholarGoogle Scholar
  12. National Institute for Standards and Technology (NIST). Guide for assessing the security controls in federal information systems, NIST Special Publication 800-53A (third public draft), 2007.Google ScholarGoogle Scholar
  13. Oran, Andy & Viega, John, (2009) Beautiful Security Metrics, Leading Security Experts Explain How They Think, Chapter 3 Elizabeth Nichols.Google ScholarGoogle Scholar
  14. Petrocelli, T.D., "Data Protection and Information Lifecycle Management," Upper Saddle River, NJ: Pearson Education, Inc., 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Security Threat Report 2013 by Sophos Labs. (Private communication)Google ScholarGoogle Scholar
  16. Sun, L., Srivastava, R.P., and Mock, T.J.2006. An information system security risk assessment model under the Dempster-Shafer Theory of Belief Functions. Journal of Management Information Systems, vol. 22, 2006, pp. 109--142. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Wade H. Baker and Linda Wallace, Is information security under control?: Investigating quality in information security management. IEEE Security and Privacy, 5(1):36--44, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. http://www.dqindia.com/dataquest/feature/205756/india-most-vulnerable-cyber-attacks#sthash.Z9TrKNYG.dpufGoogle ScholarGoogle Scholar

Index Terms

  1. A Proactive Procedure to Mitigate the BYOD Risks on the Security of an Information System

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader