Security management of BYOD and cloud environment in Saudi Arabia
The increasing trend of Bring Your Own Device (BYOD) to work has led to a significant surge in the risks related to network security. This trend is very beneficial to employers and employees alike in any organisation. The wide infiltration of spyware, malware and similarly suspicious downloads into...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2023-01-01
|
Series: | Alexandria Engineering Journal |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S1110016822004896 |
_version_ | 1797943058576179200 |
---|---|
author | Khalid Almarhabi Adel Bahaddad Ahmed Mohammed Alghamdi |
author_facet | Khalid Almarhabi Adel Bahaddad Ahmed Mohammed Alghamdi |
author_sort | Khalid Almarhabi |
collection | DOAJ |
description | The increasing trend of Bring Your Own Device (BYOD) to work has led to a significant surge in the risks related to network security. This trend is very beneficial to employers and employees alike in any organisation. The wide infiltration of spyware, malware and similarly suspicious downloads into personal devices has forced the government to reconsider its policies regarding data security. The malicious programs get downloaded onto the personal devices without the user even realising. This could disastrously affect the individuals and the governments. In the case of such an event, the BYODs become risky as they can make unauthorised policy changes and leak sensitive data into the public domain. This type of privacy breach leads to a domino effect with major legal and financial implications, and a decreased productivity for the organisations and governments. This presents a huge challenge as the governments have to consider the user rights and privacy laws and also protect the networks from these attacks. In this study, the researchers have proposed a novel technical framework that could assist the Saudi government. This framework was designed after determining the challenges that were faced by the government, based on the citizen perspectives, to control all risks challenging the use of the BYODs. This framework decreased the number of system restrictions and enforced access control policies for BYODs and cloud environments. The preliminary results of this study were positive and indicated that the framework could decrease the problems related to access control. |
first_indexed | 2024-04-10T20:18:25Z |
format | Article |
id | doaj.art-0384d10f69e34c05b5e1374d2922f121 |
institution | Directory Open Access Journal |
issn | 1110-0168 |
language | English |
last_indexed | 2024-04-10T20:18:25Z |
publishDate | 2023-01-01 |
publisher | Elsevier |
record_format | Article |
series | Alexandria Engineering Journal |
spelling | doaj.art-0384d10f69e34c05b5e1374d2922f1212023-01-26T04:44:13ZengElsevierAlexandria Engineering Journal1110-01682023-01-0163103114Security management of BYOD and cloud environment in Saudi ArabiaKhalid Almarhabi0Adel Bahaddad1Ahmed Mohammed Alghamdi2Department of Computer Science, College of Computing in Al-Qunfudah, Umm Al-Qura University, Makkah 24381, Saudi Arabia; Corresponding author.Department of Information System, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi ArabiaDepartment of Software Engineering, College of Computer Science and Engineering, University of Jeddah, Jeddah 21493, Saudi ArabiaThe increasing trend of Bring Your Own Device (BYOD) to work has led to a significant surge in the risks related to network security. This trend is very beneficial to employers and employees alike in any organisation. The wide infiltration of spyware, malware and similarly suspicious downloads into personal devices has forced the government to reconsider its policies regarding data security. The malicious programs get downloaded onto the personal devices without the user even realising. This could disastrously affect the individuals and the governments. In the case of such an event, the BYODs become risky as they can make unauthorised policy changes and leak sensitive data into the public domain. This type of privacy breach leads to a domino effect with major legal and financial implications, and a decreased productivity for the organisations and governments. This presents a huge challenge as the governments have to consider the user rights and privacy laws and also protect the networks from these attacks. In this study, the researchers have proposed a novel technical framework that could assist the Saudi government. This framework was designed after determining the challenges that were faced by the government, based on the citizen perspectives, to control all risks challenging the use of the BYODs. This framework decreased the number of system restrictions and enforced access control policies for BYODs and cloud environments. The preliminary results of this study were positive and indicated that the framework could decrease the problems related to access control.http://www.sciencedirect.com/science/article/pii/S1110016822004896Bring Your Own Device (BYOD)Information managementSaudi Arabia |
spellingShingle | Khalid Almarhabi Adel Bahaddad Ahmed Mohammed Alghamdi Security management of BYOD and cloud environment in Saudi Arabia Alexandria Engineering Journal Bring Your Own Device (BYOD) Information management Saudi Arabia |
title | Security management of BYOD and cloud environment in Saudi Arabia |
title_full | Security management of BYOD and cloud environment in Saudi Arabia |
title_fullStr | Security management of BYOD and cloud environment in Saudi Arabia |
title_full_unstemmed | Security management of BYOD and cloud environment in Saudi Arabia |
title_short | Security management of BYOD and cloud environment in Saudi Arabia |
title_sort | security management of byod and cloud environment in saudi arabia |
topic | Bring Your Own Device (BYOD) Information management Saudi Arabia |
url | http://www.sciencedirect.com/science/article/pii/S1110016822004896 |
work_keys_str_mv | AT khalidalmarhabi securitymanagementofbyodandcloudenvironmentinsaudiarabia AT adelbahaddad securitymanagementofbyodandcloudenvironmentinsaudiarabia AT ahmedmohammedalghamdi securitymanagementofbyodandcloudenvironmentinsaudiarabia |