Solutions for Mobile Devices Security Concerns, Aden Refinery Company (A.R.C) Case Study
Downloads
Companies that allow their employees to use mobile devices for work purpose, they suffer from cybersecurity challenges such as virus or malware, download illegal content, poor authorization and authentication, etc. These challenges need solutions or controls to solve or mitigate them. In this paper, there are two objectives. The first aim is to know which of the security controls were asked in the questionnaire used in the A.R.C. The second objective is to know which security scenarios the IT department uses to protect the information from potential mobile device security concerns. A descriptive methodology was employed in this study. Data were collected from forty people in the IT department at Aden Refinery Company through a questionnaire. The results show that some security controls, such as antivirus/ antimalware, backups, firewalls, and policies, are used in the A.R.C.
Gerald Nyamaiko Mutoro Wangutusi, "An exploration of how BYOD (Bring Your Own Device) user behavior impacts on an," UNIVERSITY OF NAIROBI, 2013.
Y. Wang, J. Wei, and K. Vangury, "Bring your own device security issues and challenges," IEEE 11th Consum. Commun. Netw. Conf, p. 80–85, 2014.
Z. Hallock, J. Johnston, F. Macias, R. Saville, and S. Tenneti, "Cisco Bring Your Own Device," Cisco, no 5, p. 1–338, 2013.
Ali RAH, "DEVICE MANAGEMENT IN THE SECURITY OF "BRING YOUR," University of Fairfax, March , 2023.
Tshimangadzo Brenda Sikhala, "An Evaluation of Information Technology Risks from the Use of Personal Mobile Devices for Work Purposes," UNIVERSITY OF JOHANNESBURG, 2019.
Dhingra, M., "BYOD SECURITY AND ITS POSSIBLE SOLUTIONS," International Journal of Engineering Technologies and Management Research, pp. 5(2), 101-106, 2018.
Ali, M. I., & Kaur, S., "BYOD Cyber Threat Detection and Protection Model.," International Conference on Computing, Communication, and Intelligent Systems, pp. pp. 211-218, 2021.
Phyllis Y. Moore, "FACTORS INFLUENCING THE ADOPTION OF BRING YOUR OWN DEVICE," Capella University, October 2018.
Shahbazi, M., "System and method for enforcing a security policy on mobile devices using dynamically generated security profiles.," 2014.
Griffin, J., "biggest risks of Data Leaks from personal devices.," January 2022, . [Online]. Available: https://www.fleksy.com/blog/5-biggest-risks-of-data-leaks-frompersonal-.
M. French, C. Guo and J. P. Shim,, "Current Status, Issues, and Future of Bring Your Own Device (BYOD)," Communications of the Association for Information Systems, 2014.
G. Bello , . D. Murray and . J. Armarego, "A systematic approach to investigating how information security and privacy can be achieved in BYOD environments,," Information and Computer Security, 2017.
David Njuguna , Wambui Kanyi, "An evaluation of BYOD integration cybersecurity concerns: A case study," International Journal of Recent Research in Mathematics Computer Science and Information Technology, p. 80, March 2023.
M. Ratchford, P. Wang and R. O. Sbeit, "BYOD Security Risks and Mitigations," New Generations. Advances in Intelligent Systems and Computing, 2017.
Alotaibi and H. Almagwashi, "A Review of BYOD Security Challenges, Solutions and Policy Best Practices," International Conference on Computer Applications & Information Security (ICCAIS), 2018.
Nima Zahadat, "Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security Through the Combination of Policy Management and Technology," George Washington University, January 31, 2016.
M. Eslahi , M. V. Naseri, H. Hashim, N. M. Tahir and E. H. M. Saad, "BYOD: Current state and security challenges," IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE), 2014.
J. . M. Chang, P.-C. Ho and T.-C. Chang, "Securing BYOD,," IT professionals, 2014.
Hijji, M., & Alam, G., "multivocal literature review on growing social," Ieee Access,, pp. 9, 7152-7169, 2021.
Leipold, S., "Cybersecurity Policies in The Age of Remote Work," 2021, March 15. [Online]. Available: https://www.forbes.com/sites/forbesbusinesscouncil/2021/03/15/cybersecuritypolicies-.
Guidotti, A., "Authentication and identification, essentials for secure," 17 April 2020. [Online]. Available: https://www.vintegris.com/blog/authenticationidentification-.
Amper, R., "Leveraging identity verification to secure assets in the postpandemic,," 08 June 2022, . [Online]. Available:
https://www.securityinfowatch.com/access-identity/article/21270432/leveragingidentity-.
Engle, M., "Why Passwordless Authentication Has an Identity Crisis.," 21 January 2022. [Online]. Available: https://www.forbes.com/sites/forbestechcouncil/2022/01/21/whypasswordless-.
Abhijith, M., & Senthilvadivu, K., "Impact Of VPN Technology On IT Industry," 2020. [Online]. Available: https://www.ijeast.com/papers/152-157,Tesma505,IJEAST.pdf.
Zscaler., "Zscaler's 2022 VPN Report: As VPN Exploits Grow, 80 Percent of Organizations Shift Towards Zero Trust Security.," 2022, September 26. [Online]. Available:
https://www.zscaler.com/press/zscalers-2022-vpn-report-vpn-exploits-grow-80-.
Venkat, A., "97% of enterprises say VPNs are prone to," 2022, September 26. [Online]. Available: https://www.csoonline.com/article/3674793/97-of-enterprises-say-vpns-areprone-.