SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
BYOD SCOPE: A Study of Corporate Policies in
Pakistan
Dr. Zahid Anwar, Shuja Ahmad, Haris Javaid, Muhammad Arslan Ejaz
Abstract--- BYOD model is used to enhance
productivity by recommending employees to be
connected to organization’s network 24/7. There
are several major issues related to securing the
information which must be in consideration by IT
department of the company. They must assure
extreme level of data protection, operability, and
efficient manageability. BYOD can give efficient,
easily accessible, satisfied and instantaneous
results; but without the right policies,
organizations can have unwanted risks. Data
security breaches have been an issue for years, but
still risks are increasing day by day with the
growth in mobility and variety of devices.
Currently there are many organizations in the
world (a few in Pakistan) that are using BYOD.
As these devices are increasingly being used in the
organizations and as companies provide smart
devices to which user can easily add any desired
application, conflicts arise. Who owns the
application on separately owned devices? Is there
any restriction mechanism? And if user leaves the
company what will happen to the device? We
describe all the prominent policy features and
data breeches that have occurred against those
features.
I. INTRODUCTION
Bring your own device (BYOD) can be
defined as the rules and policies by which the
employees are allowed to use their personal devices
in their offices for example smart phones, tablets etc.
They can use these devices to get access to the
information and applications of organization that are
accessible for them. The terminology is also useful in
the education sector applied on students. Some
people have confidence that with the usage of
BYOD, employees working in the companies are
supposed to be more productive due to the fact that t
grows the employee self-confidence and ease in
accessibility by using their own smart devices and
thinks that the company is flexible. It creates a
challenge for the management of organization; it has
a lot of involvement beyond the IT sector. Although
many may not know about it, some employers are
able to track all the activities of their employees i.e.
locations during working hours, applications they
have installed, view or delete their personal data. The
Adaptive Mobile [1] study showed a survey
conducted by Harris Interactive [2], there were two
kinds of audience targeted in the survey, Users and
IT Decision Makers from 1,000 IT decision makers
and 1,000 employees, 83% of staff would stop using
their own device, or use with deep concern, if they
knew their employer could see what they were doing
all the time.
There are some important questions like
“Who will be the owner of the data?” or “Does the
company have the ability to remove some or all of
the data on a device in case of security concern?”
Mobile devices, specifically smartphones are present
everywhere. Due to this, businesses are now starting
to evolve "Bring Your Own Device" policies to allow
their employees to use their smart devices and stay
connected to the organization. However, there are
some notable attacks and obstacle to get maximum
device resources; it is difficult to trust these devices
with access to critical information relating to a
particular owner. If an organization is going to
encourage a BYOD policy, it needs to have a lot of
security discipline, and needs to have staff to manage
the environment 24/7. So it needs to design a set of
rules (related polices) so it can ensure security within
implementation of this model. But most of the time
companies have no policy due to which they suffer
from breach of sensitive information.
Our analysis showed that if companies have
bad policies and having no deep concentrations on
BYOD they must face data breach within no time as
technology is evolving day by day, and new
technologies, new opportunities are emerging very
fast in IT world. We analyzed some breaches
occurred in these specific organizations and it
showed the weakness, fault and problems within the
policies of the model. If we make a comprehensive
policy that covers the solution of maximum problems
that may occur in the company, we can protect our
crucial and sensitive data while having full usage of
BYOD. In the next sections we will suggest and
explain what points and rules must be there in the
policy to get maximum avoidance from data
breaches. Our concern is to find all the possible
answers the key questions related to the present
model. We specifically focus on the key components
i.e. familiarity, awareness of employees engaging,
application and information types access, formal
company policy, mobile device management,
employees data security, importance of security,
benefits, recovery responsibility and all the risks
related to the model. Further in section 2 we will
describe the work done by other authors.
II. RELATED WORK
Antonio Scarfo described in his paper [3]
about a security experience BYOD (Bring Your Own
Device) as; it is a different habit shows an
opportunity and a challenge as well for the
organizations. The challenge leads to some critical
risks. The smart device that is in use for both working
and personal activities cause some new security
issues IT companies would have to face. The security
models summarized by the author have two
approaches: hands-on devices and hands-off devices.
The hand-off approach is effective if there is a
concept of virtualization where the daily basis
operations are done by the employees’ themselves, as
virtualization style. On the other hand the hands-on
approach (e.g. MDM) is based on perfect control of
these smart devices allowing the organization to
control, monitor, and manage data, software installed,
applications settings, network usage, together with
the utilization of the devices and the behavior of the
end users.
In the perspective of BYOD the end users are
convenient with the first approach because of
easiness; however, in the coming time it might be
possible that this approach would integrate some key
features related to MDM to get some more benefits in
security point of view of company. There must be
some relation between policies, roles and the legal
agreement between companies and employees that
should be counted as an important issue. Finally, the
most important thing is: if an enterprise wants to
accept BYOD, its acceptance style should be simple,
easy and friendly, the necessary rules, elements
should be enforced just in presence of hard situations
and let them leave free to choose their devices by
considering the right kind of tasks, roles, and
operating knowledge. IT delivery model can be used
to provide these sorts of things.
Ruth Lennon briefly described in his paper
[4] that IT managers from all over the world must
have to change their attitude towards today’s workers
and learners. The more advance point of view to
upgrade to bring your own device with high
resources on the cloud seems assured. However there
is a requirement for BYOD users to re-evaluate their
attitude toward their own devices’ security and the
resources they used, due to increase in mobility trend
and flexibility in IT. Author mentions a
determination of business user’s attitudes towards
using BYOD for business. He also describes the
results of a survey of on business users attitudes
towards resources stored on the cloud. In the end
there are some suggestions made regarding the help
that should be given to the users’ for prevention of
security risks in BYOD and the Cloud. The brief
analysis above indicates the general lack of
knowledge of system users as to the risks
surrounding the user of personal devices such as
laptops. Due to lack of security in applications used
in BYOD the users’ general trends have small
amount of information. According to this it is
absolutely necessary that there must be education and
awareness programs conducted for the users of
BYOD & Cloud system so they can mitigate the
security risks of such systems.
Another BYOD related paper [5] showed the
trends in analysis and technology of development of
information systems strictly indicate the frames
known as cloud computing. In the cloud there are
certain advantages and as well as challenges related
to the Information systems. System security is very
important so it requires more care and more attention.
There are some general Problems, meaning they are
anyway equal to the main business function for
which that particular IS being developed. Since
decades the real treatment of activities known as
eLearning requires additional reflection in education.
It should be handled as system with all its
functionalities and additional specificities.
Independence of location and time of realization
provides an additional possibility. This means there is
a possibility of integrating the personal user’s
equipment in eLearning. If we talk about BYOD in
practical information science, it supposes that smart
devices are helpful for the final users to approach
their business resources. This paper examines the
readiness of student and teachers to adopt such
teaching modes.
Fast development of information science in
all its fields has been accompanied by frequent
modifications of paradigm used in information
systems development. Specificities of connections
between business and information systems are
necessary consequence of these modifications,
especially due to influences of mutual changes in a
mode of business’ organization. BYOD frame isn’t
dependent of business itself in the same measure that
business can be independent in any segment or form
of place and time of realization. Since eLearning is
proclaimed as location and time independent, BYOD
organization offers additional possibilities. Primarily
this could significantly make educational process
cheaper which is the strongest recommendation for
such organization. Further researches could pay
attentions to specific forms of business such as
eLearning or Cloud Computing. This research hasn’t
insisted on specific sort of business or suggested any
specificities of business. This supposed to emphasize
the generic possibilities of BYOD paradigm.
Khoula Alharthy published a paper [6] in
IEEE that briefly discussed about the security of
(BYOD) as the way to protect organization’s network
against Variety of threats which come through mobile
devices and access channels. The author explains the
implementation of security solution in higher
education institution in Oman. This security solution
helps to protect the network data from unauthorized
access, as well as, controlling unmanaged devices
which are smartphones and mobile devices. Research
will follow these steps starting with literature review,
data collection, analysis; design the network structure
with suggested solution and implementation for
BYOD security solutions. As well as, monitoring the
network performance with the implanted solutions to
keep track if traffic flow with high availability and
security. This research paper will help to facilitate the
work to the network users through allowing BYOD
as well as increase the network availability, ability
and security through 802.1x, CA and RADius.
The research presents a set of principles that
any organization should follow before implementing
the BYOD framework. As a consequence of these
principles one is provided with availability, usability,
mobility and security. A summary of all findings that
has been listed through the research steps indicates
that the BYOD framework should be applied in
phases which are not the typical case as in other
systems in which the IT team will configure and then
train the users about using. Upgrading the network
infrastructure and adding mobile VLAN with using
802.1x as encryption algorithms and support RADius
and CA for authentication was only the first step of
implementing BYOD in the organization and few
more steps are required to achieve secure BYOD.
Such as, upgrade the storage capacity to handle data
three times more than the capacity that it currently
can. Monitor the wireless performance and wireless
bandwidth. All mobile devices such as smartphones
and tablets are now able to access through wireless
connection.
III. RESULTS
As the result of our survey in some organizations, we
found some interesting things about the model
implemented in those organizations. Then we
compared our results with companies in the
developed countries.
Employee’s awareness;
Fig.1 % of employees using BYOD
Fig.2 Aware of all employees’ access
Mostly organizations said they were aware of the
connectivity of the employees’ devices in the
network. 39% were not aware by the connectivity.
In comparison to developed world, in Pakistan
mostly employers are aware of accessing data but
there are very less BYOD implemented
infrastructures.
Fig.3 Without employers’ knowledge
Device and Application;
It is observed that smartphones are more preferably
used smart device by the users and the most used and
accessed application is email.
Among Smartphones--83%
Among Tablets—66%
Other—14%
Fig.4 typically accessed application
In comparison to developed world, mostly
applications in organizations in Pakistan have very
specific policy that does not include is emails related,
i.e. outlook etc...
Presence of formal BYOD policy;
Fig.5 Have a Policy
Fig.6 when the company put their policy
In comparison to developed world, mostly
organizations in Pakistan have very specific policy
that does not includes all the components of security
e.g. simple policy may include restrictions on
attachments and pictures are not allowed.
Who bear the Costs?
Fig.7 Employers’ point of view
In comparison to developed world, in Pakistan cost is
to be paid by some device owners and in some cases
organizations provide the device to the employees on
company’s cost.
Policy consists of;
Fig.8 when an employee leaves the company
Fig.9 Policy covers
Fig.10 Having MDM
In comparison to developed world, some
organizations have a policy, if some user is going to
leave the job, they delete the account from that
device and auto format all the device, others have a
solution to specify what type of application can be
accessed. E.g. Specs in Huawei.
Company--24%
Wireless Providers--9%
The employee--67%
Fig.11
Responsibilty
The
Company
The
Wireless
Provider
The
employee
0
2
4
6
8
Restrictions
Fig.25 Responsibility of keeping employees’ device
secure
Companies with larger infrastructure are more likely
to say the risks are more significant than benefits
when it comes to BYOD. But the companies of
different sizes are able to recognize the benefits.
Fig.12 Companies by the size engaging in the
BYOD
Smaller companies are slightly less likely to have
employees who engage in BYOD.
Very few users have experienced cyber-attacks or
had their device stolen or lost, but of those who did
they are much more concerned about their personal
information than their company’s information.
IV. EVALUATION
Section 2 and 4 discussed the features of BYOD.
We can see that there is a number of concerns we
may have to make things right. If an organization
wants to get the best results after deploying this
model they must have to insure that their policy is
secure so they could get more productivity not losses.
We observed some breaches in the multinational
organizations that is occurred by the lacking of
required concentrations in making the security policy,
but in Pakistan as there is no such deployment at that
level, the breaches are less or if they are present
there, the mostly users don’t even know what has lost
and what is the importance of that information.
To make sure that there is no data breach
occurring in the organization they must have to
concentrate on the following points; Routine Assess
Capability i.e. carefully evaluate the daily basis
network access and monitor according to the policy,
Use a mobile device management solution i.e.
monitor and control application installed, configure
and monitor devices with the use of asset tracking
and reporting, Deploy high defense security i.e.
Mobile Device Management with geo-fencing and
use of virtualization can be helpful in separating the
personal and business data.
We have surveyed three companies. Two were
telecom companies and one was an internet service
provider. All three were having BYOD policies
although employees were not aware of this term
“BYOD” but they were aware of connecting devices
to workplace internet. ISP firm was having more
professional IT and IS people. Employees were
allowed to access emails on their devices. Official
0
20
40
60
80
Less than 500
500 or more
0% 50% 100%
Less than
500
500 or
more
Risk
strongly
greater
Risk
somewhat
greater
Benefits
somewhat
greater
0 50 100
Personal
Company's
Very
Somewhat
Not very
Not at all
data was not allowed to be fetched on mobile device.
In one Telecom Company there were almost
same policies as mention before. But they were also
using an application called SPECS that keeps logs of
user activities. Whenever user sends request for
particular site or data it passes through this
application window and in the same way data was
downloaded through this application. Secondly
employees were not allowed to take snaps of official
data through smart devices. This activity was being
monitored by CCTVs. The same company also gave
laptops to its users with already installed
applications. Ports of these devices were also blocked
so that users may not use flash drives. When we
asked about data breaches we came to know that
there were few incidents of breaches. One employee
tried to send official data to his personal email
account using office account but this activity was
logged and notification was sent to the employee. In
another case an employee bypassed the official
network by accessing internet using GSM. He
download virus on his laptop and that caused alarm in
network. In response to this activity an email was
sent from higher authority to all employees that they
should not click on virus link.
Second Telecom Company also implemented
BYOD but officials were very reluctant to share any
information about the policies or security breaches.
One thing that they were ready to share was that they
were also allowed to access only emails on mobile
device. That company was using Microsoft security
tools on laptops but officials did not disclose the
name of that tool. On their end there were valid
reasons as this is a confidential matter so maybe they
were not ready to share any information with us.
Are you aware of your Business goals?
Identify your goals
Analyze existing policies
Understand end user cases accordingly
Determine support capabilities
Determine your needs and phases
Define segregation of personal and
organization data
Define minimum device requirements
Define stipend and payments
Define stipend and payments
Yes No
Do you still feel BYOD will make sense to you?
V. CONCLUSION
Some say; “BYOD is the wave of the future so
companies need to get on board” others say; “BYOD
is a fad that will soon fade”. Companies emphasize
“data protection”, “security of device”, and
“employee compliance” as their chief concerns.
Users recognize BYOD may be wave of the future
and organizations feel the benefits should be heavier
than risks. The major problem that multinational
organizations are facing is with the BYOD policy of
the organization. But in our country it is awareness of
the technology that must be assured to make full use
of BYOD. In Pakistan there is a huge need of giving
knowledge to employees as well as organizations.
Our survey showed that there is very less know how
to the employees and little bit more knowledge to the
employers.
VI. REFERENCES
[1] http://www.adaptivemobile.com/about-us
[2] http://www.harrisinteractive.com/AboutUs.aspx
[3] F. Palmieri, and A. Castiglione, "Automatic
security assessment for next generation wireless
mobile networks". In: Mobile Information
Systems 7(3), IOS Press, pp. 217-239. 2011.
doi:10.3233/MIS-2011- 0119
[4] G. Lennon. R , “Changing User Attitudes to
Security in BYOD” Computing Department,
Letterkenny Institute of Technology Letterkenny,
Publication Year: 2012
[5] Scarfo, A. Broadband, Wireless Computing,
Communication and Applications (BWCCA),
2012 Seventh International Conference on
Digital Object
Identifier: 10.1109/BWCCA.2012.79 Publication
Year: 2012 , Page(s): 446 – 451
[6] Khoula AlHarthy, “Network Security Control
Solutions in BYOD” Department of Computing,
Middle East College, Muscat/Oman, 2013 IEEE
International Conference on Control System,
Computing and Engineering, 29 Nov. - 1 Dec.
2013, Penang, Malaysia
[7] [7] http://www.chartgo.com/index.jsp
VII. Appendix A
Survey consists of following questions.
a. BYOD Policy exists or not
b. Type of accessible data
c. Employees’ Awareness
d. Most using device
e. Mostly used application
f. Security of Device
g. Personal or company’s data concerned
h. Site restrictions
i. Handling of BYOD IT or IS
j. Responsibility of cost
k. Effect of using BYOD
VIII. Appendix B
We conducted the survey by going to regional offices
and communicating with the IT officials of three
companies of Pakistan. But we are not allowed to
disclose the names, because they use some sensitive
tools for their data security.

Contenu connexe

Tendances

7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
Caston Thomas
 

Tendances (20)

Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devices
 
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
 
Managing BYOD in Corporate Environments
Managing BYOD in Corporate EnvironmentsManaging BYOD in Corporate Environments
Managing BYOD in Corporate Environments
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle east
 
Social Media - Transforming B2B Organizations: Contemporary Concerns Study
Social Media - Transforming B2B Organizations: Contemporary Concerns StudySocial Media - Transforming B2B Organizations: Contemporary Concerns Study
Social Media - Transforming B2B Organizations: Contemporary Concerns Study
 
BYOD: A Global Perspective
BYOD: A Global PerspectiveBYOD: A Global Perspective
BYOD: A Global Perspective
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
Top cited managing information technology articles
Top cited managing information technology articlesTop cited managing information technology articles
Top cited managing information technology articles
 
End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
 
VMware Model for Enterprise Mobility
VMware Model for Enterprise MobilityVMware Model for Enterprise Mobility
VMware Model for Enterprise Mobility
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
Information Management chapter 2
Information Management chapter 2Information Management chapter 2
Information Management chapter 2
 
Bridge the Gap Between IT and Staff
Bridge the Gap Between IT and StaffBridge the Gap Between IT and Staff
Bridge the Gap Between IT and Staff
 

En vedette (8)

Omar & Alex S Chap 13 3
Omar & Alex S    Chap 13 3Omar & Alex S    Chap 13 3
Omar & Alex S Chap 13 3
 
RIS, LLC.
RIS, LLC.RIS, LLC.
RIS, LLC.
 
Bibliomist survey results typical library user
Bibliomist survey results   typical library userBibliomist survey results   typical library user
Bibliomist survey results typical library user
 
Bibliomist Slideshow Citizen Survey
Bibliomist Slideshow Citizen SurveyBibliomist Slideshow Citizen Survey
Bibliomist Slideshow Citizen Survey
 
E-learning 2.0
E-learning 2.0E-learning 2.0
E-learning 2.0
 
костромские ремесла рома соф
костромские ремесла  рома софкостромские ремесла  рома соф
костромские ремесла рома соф
 
Io244s Australia
Io244s AustraliaIo244s Australia
Io244s Australia
 
Ashley And Jessica
Ashley And JessicaAshley And Jessica
Ashley And Jessica
 

Similaire à BYOD SCOPE: A Study of Corporate Policies in Pakistan

BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
Harsh Kishore Mishra
 
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
vickeryr87
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
JAYANT RAJURKAR
 
Mobilising business
Mobilising  businessMobilising  business
Mobilising business
Sno Jutt
 

Similaire à BYOD SCOPE: A Study of Corporate Policies in Pakistan (20)

Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
BYOD
BYODBYOD
BYOD
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology Innovations
 
Enterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.comEnterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.com
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
Enterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.comEnterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.com
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategy
 
Byod
ByodByod
Byod
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettle
 
Mobilising business
Mobilising  businessMobilising  business
Mobilising business
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

BYOD SCOPE: A Study of Corporate Policies in Pakistan

  • 1. BYOD SCOPE: A Study of Corporate Policies in Pakistan Dr. Zahid Anwar, Shuja Ahmad, Haris Javaid, Muhammad Arslan Ejaz Abstract--- BYOD model is used to enhance productivity by recommending employees to be connected to organization’s network 24/7. There are several major issues related to securing the information which must be in consideration by IT department of the company. They must assure extreme level of data protection, operability, and efficient manageability. BYOD can give efficient, easily accessible, satisfied and instantaneous results; but without the right policies, organizations can have unwanted risks. Data security breaches have been an issue for years, but still risks are increasing day by day with the growth in mobility and variety of devices. Currently there are many organizations in the world (a few in Pakistan) that are using BYOD. As these devices are increasingly being used in the organizations and as companies provide smart devices to which user can easily add any desired application, conflicts arise. Who owns the application on separately owned devices? Is there any restriction mechanism? And if user leaves the company what will happen to the device? We describe all the prominent policy features and data breeches that have occurred against those features. I. INTRODUCTION Bring your own device (BYOD) can be defined as the rules and policies by which the employees are allowed to use their personal devices in their offices for example smart phones, tablets etc. They can use these devices to get access to the information and applications of organization that are accessible for them. The terminology is also useful in the education sector applied on students. Some people have confidence that with the usage of BYOD, employees working in the companies are supposed to be more productive due to the fact that t grows the employee self-confidence and ease in accessibility by using their own smart devices and thinks that the company is flexible. It creates a challenge for the management of organization; it has a lot of involvement beyond the IT sector. Although many may not know about it, some employers are able to track all the activities of their employees i.e. locations during working hours, applications they have installed, view or delete their personal data. The Adaptive Mobile [1] study showed a survey conducted by Harris Interactive [2], there were two kinds of audience targeted in the survey, Users and IT Decision Makers from 1,000 IT decision makers and 1,000 employees, 83% of staff would stop using their own device, or use with deep concern, if they knew their employer could see what they were doing all the time. There are some important questions like “Who will be the owner of the data?” or “Does the company have the ability to remove some or all of the data on a device in case of security concern?” Mobile devices, specifically smartphones are present everywhere. Due to this, businesses are now starting to evolve "Bring Your Own Device" policies to allow their employees to use their smart devices and stay connected to the organization. However, there are some notable attacks and obstacle to get maximum device resources; it is difficult to trust these devices with access to critical information relating to a particular owner. If an organization is going to encourage a BYOD policy, it needs to have a lot of security discipline, and needs to have staff to manage the environment 24/7. So it needs to design a set of rules (related polices) so it can ensure security within implementation of this model. But most of the time companies have no policy due to which they suffer from breach of sensitive information. Our analysis showed that if companies have bad policies and having no deep concentrations on BYOD they must face data breach within no time as technology is evolving day by day, and new technologies, new opportunities are emerging very fast in IT world. We analyzed some breaches
  • 2. occurred in these specific organizations and it showed the weakness, fault and problems within the policies of the model. If we make a comprehensive policy that covers the solution of maximum problems that may occur in the company, we can protect our crucial and sensitive data while having full usage of BYOD. In the next sections we will suggest and explain what points and rules must be there in the policy to get maximum avoidance from data breaches. Our concern is to find all the possible answers the key questions related to the present model. We specifically focus on the key components i.e. familiarity, awareness of employees engaging, application and information types access, formal company policy, mobile device management, employees data security, importance of security, benefits, recovery responsibility and all the risks related to the model. Further in section 2 we will describe the work done by other authors. II. RELATED WORK Antonio Scarfo described in his paper [3] about a security experience BYOD (Bring Your Own Device) as; it is a different habit shows an opportunity and a challenge as well for the organizations. The challenge leads to some critical risks. The smart device that is in use for both working and personal activities cause some new security issues IT companies would have to face. The security models summarized by the author have two approaches: hands-on devices and hands-off devices. The hand-off approach is effective if there is a concept of virtualization where the daily basis operations are done by the employees’ themselves, as virtualization style. On the other hand the hands-on approach (e.g. MDM) is based on perfect control of these smart devices allowing the organization to control, monitor, and manage data, software installed, applications settings, network usage, together with the utilization of the devices and the behavior of the end users. In the perspective of BYOD the end users are convenient with the first approach because of easiness; however, in the coming time it might be possible that this approach would integrate some key features related to MDM to get some more benefits in security point of view of company. There must be some relation between policies, roles and the legal agreement between companies and employees that should be counted as an important issue. Finally, the most important thing is: if an enterprise wants to accept BYOD, its acceptance style should be simple, easy and friendly, the necessary rules, elements should be enforced just in presence of hard situations and let them leave free to choose their devices by considering the right kind of tasks, roles, and operating knowledge. IT delivery model can be used to provide these sorts of things. Ruth Lennon briefly described in his paper [4] that IT managers from all over the world must have to change their attitude towards today’s workers and learners. The more advance point of view to upgrade to bring your own device with high resources on the cloud seems assured. However there is a requirement for BYOD users to re-evaluate their attitude toward their own devices’ security and the resources they used, due to increase in mobility trend and flexibility in IT. Author mentions a determination of business user’s attitudes towards using BYOD for business. He also describes the results of a survey of on business users attitudes towards resources stored on the cloud. In the end there are some suggestions made regarding the help that should be given to the users’ for prevention of security risks in BYOD and the Cloud. The brief analysis above indicates the general lack of knowledge of system users as to the risks surrounding the user of personal devices such as laptops. Due to lack of security in applications used in BYOD the users’ general trends have small amount of information. According to this it is absolutely necessary that there must be education and awareness programs conducted for the users of BYOD & Cloud system so they can mitigate the security risks of such systems. Another BYOD related paper [5] showed the trends in analysis and technology of development of information systems strictly indicate the frames known as cloud computing. In the cloud there are certain advantages and as well as challenges related to the Information systems. System security is very important so it requires more care and more attention. There are some general Problems, meaning they are anyway equal to the main business function for which that particular IS being developed. Since
  • 3. decades the real treatment of activities known as eLearning requires additional reflection in education. It should be handled as system with all its functionalities and additional specificities. Independence of location and time of realization provides an additional possibility. This means there is a possibility of integrating the personal user’s equipment in eLearning. If we talk about BYOD in practical information science, it supposes that smart devices are helpful for the final users to approach their business resources. This paper examines the readiness of student and teachers to adopt such teaching modes. Fast development of information science in all its fields has been accompanied by frequent modifications of paradigm used in information systems development. Specificities of connections between business and information systems are necessary consequence of these modifications, especially due to influences of mutual changes in a mode of business’ organization. BYOD frame isn’t dependent of business itself in the same measure that business can be independent in any segment or form of place and time of realization. Since eLearning is proclaimed as location and time independent, BYOD organization offers additional possibilities. Primarily this could significantly make educational process cheaper which is the strongest recommendation for such organization. Further researches could pay attentions to specific forms of business such as eLearning or Cloud Computing. This research hasn’t insisted on specific sort of business or suggested any specificities of business. This supposed to emphasize the generic possibilities of BYOD paradigm. Khoula Alharthy published a paper [6] in IEEE that briefly discussed about the security of (BYOD) as the way to protect organization’s network against Variety of threats which come through mobile devices and access channels. The author explains the implementation of security solution in higher education institution in Oman. This security solution helps to protect the network data from unauthorized access, as well as, controlling unmanaged devices which are smartphones and mobile devices. Research will follow these steps starting with literature review, data collection, analysis; design the network structure with suggested solution and implementation for BYOD security solutions. As well as, monitoring the network performance with the implanted solutions to keep track if traffic flow with high availability and security. This research paper will help to facilitate the work to the network users through allowing BYOD as well as increase the network availability, ability and security through 802.1x, CA and RADius. The research presents a set of principles that any organization should follow before implementing the BYOD framework. As a consequence of these principles one is provided with availability, usability, mobility and security. A summary of all findings that has been listed through the research steps indicates that the BYOD framework should be applied in phases which are not the typical case as in other systems in which the IT team will configure and then train the users about using. Upgrading the network infrastructure and adding mobile VLAN with using 802.1x as encryption algorithms and support RADius and CA for authentication was only the first step of implementing BYOD in the organization and few more steps are required to achieve secure BYOD. Such as, upgrade the storage capacity to handle data three times more than the capacity that it currently can. Monitor the wireless performance and wireless bandwidth. All mobile devices such as smartphones and tablets are now able to access through wireless connection. III. RESULTS As the result of our survey in some organizations, we found some interesting things about the model implemented in those organizations. Then we compared our results with companies in the developed countries.
  • 4. Employee’s awareness; Fig.1 % of employees using BYOD Fig.2 Aware of all employees’ access Mostly organizations said they were aware of the connectivity of the employees’ devices in the network. 39% were not aware by the connectivity. In comparison to developed world, in Pakistan mostly employers are aware of accessing data but there are very less BYOD implemented infrastructures. Fig.3 Without employers’ knowledge Device and Application; It is observed that smartphones are more preferably used smart device by the users and the most used and accessed application is email. Among Smartphones--83% Among Tablets—66% Other—14% Fig.4 typically accessed application In comparison to developed world, mostly applications in organizations in Pakistan have very specific policy that does not include is emails related, i.e. outlook etc... Presence of formal BYOD policy; Fig.5 Have a Policy Fig.6 when the company put their policy
  • 5. In comparison to developed world, mostly organizations in Pakistan have very specific policy that does not includes all the components of security e.g. simple policy may include restrictions on attachments and pictures are not allowed. Who bear the Costs? Fig.7 Employers’ point of view In comparison to developed world, in Pakistan cost is to be paid by some device owners and in some cases organizations provide the device to the employees on company’s cost. Policy consists of; Fig.8 when an employee leaves the company Fig.9 Policy covers Fig.10 Having MDM In comparison to developed world, some organizations have a policy, if some user is going to leave the job, they delete the account from that device and auto format all the device, others have a solution to specify what type of application can be accessed. E.g. Specs in Huawei. Company--24% Wireless Providers--9% The employee--67% Fig.11 Responsibilty The Company The Wireless Provider The employee 0 2 4 6 8 Restrictions
  • 6. Fig.25 Responsibility of keeping employees’ device secure Companies with larger infrastructure are more likely to say the risks are more significant than benefits when it comes to BYOD. But the companies of different sizes are able to recognize the benefits. Fig.12 Companies by the size engaging in the BYOD Smaller companies are slightly less likely to have employees who engage in BYOD. Very few users have experienced cyber-attacks or had their device stolen or lost, but of those who did they are much more concerned about their personal information than their company’s information. IV. EVALUATION Section 2 and 4 discussed the features of BYOD. We can see that there is a number of concerns we may have to make things right. If an organization wants to get the best results after deploying this model they must have to insure that their policy is secure so they could get more productivity not losses. We observed some breaches in the multinational organizations that is occurred by the lacking of required concentrations in making the security policy, but in Pakistan as there is no such deployment at that level, the breaches are less or if they are present there, the mostly users don’t even know what has lost and what is the importance of that information. To make sure that there is no data breach occurring in the organization they must have to concentrate on the following points; Routine Assess Capability i.e. carefully evaluate the daily basis network access and monitor according to the policy, Use a mobile device management solution i.e. monitor and control application installed, configure and monitor devices with the use of asset tracking and reporting, Deploy high defense security i.e. Mobile Device Management with geo-fencing and use of virtualization can be helpful in separating the personal and business data. We have surveyed three companies. Two were telecom companies and one was an internet service provider. All three were having BYOD policies although employees were not aware of this term “BYOD” but they were aware of connecting devices to workplace internet. ISP firm was having more professional IT and IS people. Employees were allowed to access emails on their devices. Official 0 20 40 60 80 Less than 500 500 or more 0% 50% 100% Less than 500 500 or more Risk strongly greater Risk somewhat greater Benefits somewhat greater 0 50 100 Personal Company's Very Somewhat Not very Not at all
  • 7. data was not allowed to be fetched on mobile device. In one Telecom Company there were almost same policies as mention before. But they were also using an application called SPECS that keeps logs of user activities. Whenever user sends request for particular site or data it passes through this application window and in the same way data was downloaded through this application. Secondly employees were not allowed to take snaps of official data through smart devices. This activity was being monitored by CCTVs. The same company also gave laptops to its users with already installed applications. Ports of these devices were also blocked so that users may not use flash drives. When we asked about data breaches we came to know that there were few incidents of breaches. One employee tried to send official data to his personal email account using office account but this activity was logged and notification was sent to the employee. In another case an employee bypassed the official network by accessing internet using GSM. He download virus on his laptop and that caused alarm in network. In response to this activity an email was sent from higher authority to all employees that they should not click on virus link. Second Telecom Company also implemented BYOD but officials were very reluctant to share any information about the policies or security breaches. One thing that they were ready to share was that they were also allowed to access only emails on mobile device. That company was using Microsoft security tools on laptops but officials did not disclose the name of that tool. On their end there were valid reasons as this is a confidential matter so maybe they were not ready to share any information with us. Are you aware of your Business goals? Identify your goals Analyze existing policies Understand end user cases accordingly Determine support capabilities Determine your needs and phases Define segregation of personal and organization data Define minimum device requirements Define stipend and payments Define stipend and payments Yes No Do you still feel BYOD will make sense to you?
  • 8. V. CONCLUSION Some say; “BYOD is the wave of the future so companies need to get on board” others say; “BYOD is a fad that will soon fade”. Companies emphasize “data protection”, “security of device”, and “employee compliance” as their chief concerns. Users recognize BYOD may be wave of the future and organizations feel the benefits should be heavier than risks. The major problem that multinational organizations are facing is with the BYOD policy of the organization. But in our country it is awareness of the technology that must be assured to make full use of BYOD. In Pakistan there is a huge need of giving knowledge to employees as well as organizations. Our survey showed that there is very less know how to the employees and little bit more knowledge to the employers. VI. REFERENCES [1] http://www.adaptivemobile.com/about-us [2] http://www.harrisinteractive.com/AboutUs.aspx [3] F. Palmieri, and A. Castiglione, "Automatic security assessment for next generation wireless mobile networks". In: Mobile Information Systems 7(3), IOS Press, pp. 217-239. 2011. doi:10.3233/MIS-2011- 0119 [4] G. Lennon. R , “Changing User Attitudes to Security in BYOD” Computing Department, Letterkenny Institute of Technology Letterkenny, Publication Year: 2012 [5] Scarfo, A. Broadband, Wireless Computing, Communication and Applications (BWCCA), 2012 Seventh International Conference on Digital Object Identifier: 10.1109/BWCCA.2012.79 Publication Year: 2012 , Page(s): 446 – 451 [6] Khoula AlHarthy, “Network Security Control Solutions in BYOD” Department of Computing, Middle East College, Muscat/Oman, 2013 IEEE International Conference on Control System, Computing and Engineering, 29 Nov. - 1 Dec. 2013, Penang, Malaysia [7] [7] http://www.chartgo.com/index.jsp VII. Appendix A Survey consists of following questions. a. BYOD Policy exists or not b. Type of accessible data c. Employees’ Awareness d. Most using device e. Mostly used application f. Security of Device g. Personal or company’s data concerned h. Site restrictions i. Handling of BYOD IT or IS j. Responsibility of cost k. Effect of using BYOD VIII. Appendix B We conducted the survey by going to regional offices and communicating with the IT officials of three companies of Pakistan. But we are not allowed to disclose the names, because they use some sensitive tools for their data security.