Security management of BYOD and cloud environment in Saudi Arabia

The increasing trend of Bring Your Own Device (BYOD) to work has led to a significant surge in the risks related to network security. This trend is very beneficial to employers and employees alike in any organisation. The wide infiltration of spyware, malware and similarly suspicious downloads into...

Full description

Bibliographic Details
Main Authors: Khalid Almarhabi, Adel Bahaddad, Ahmed Mohammed Alghamdi
Format: Article
Language:English
Published: Elsevier 2023-01-01
Series:Alexandria Engineering Journal
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S1110016822004896
_version_ 1797943058576179200
author Khalid Almarhabi
Adel Bahaddad
Ahmed Mohammed Alghamdi
author_facet Khalid Almarhabi
Adel Bahaddad
Ahmed Mohammed Alghamdi
author_sort Khalid Almarhabi
collection DOAJ
description The increasing trend of Bring Your Own Device (BYOD) to work has led to a significant surge in the risks related to network security. This trend is very beneficial to employers and employees alike in any organisation. The wide infiltration of spyware, malware and similarly suspicious downloads into personal devices has forced the government to reconsider its policies regarding data security. The malicious programs get downloaded onto the personal devices without the user even realising. This could disastrously affect the individuals and the governments. In the case of such an event, the BYODs become risky as they can make unauthorised policy changes and leak sensitive data into the public domain. This type of privacy breach leads to a domino effect with major legal and financial implications, and a decreased productivity for the organisations and governments. This presents a huge challenge as the governments have to consider the user rights and privacy laws and also protect the networks from these attacks. In this study, the researchers have proposed a novel technical framework that could assist the Saudi government. This framework was designed after determining the challenges that were faced by the government, based on the citizen perspectives, to control all risks challenging the use of the BYODs. This framework decreased the number of system restrictions and enforced access control policies for BYODs and cloud environments. The preliminary results of this study were positive and indicated that the framework could decrease the problems related to access control.
first_indexed 2024-04-10T20:18:25Z
format Article
id doaj.art-0384d10f69e34c05b5e1374d2922f121
institution Directory Open Access Journal
issn 1110-0168
language English
last_indexed 2024-04-10T20:18:25Z
publishDate 2023-01-01
publisher Elsevier
record_format Article
series Alexandria Engineering Journal
spelling doaj.art-0384d10f69e34c05b5e1374d2922f1212023-01-26T04:44:13ZengElsevierAlexandria Engineering Journal1110-01682023-01-0163103114Security management of BYOD and cloud environment in Saudi ArabiaKhalid Almarhabi0Adel Bahaddad1Ahmed Mohammed Alghamdi2Department of Computer Science, College of Computing in Al-Qunfudah, Umm Al-Qura University, Makkah 24381, Saudi Arabia; Corresponding author.Department of Information System, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi ArabiaDepartment of Software Engineering, College of Computer Science and Engineering, University of Jeddah, Jeddah 21493, Saudi ArabiaThe increasing trend of Bring Your Own Device (BYOD) to work has led to a significant surge in the risks related to network security. This trend is very beneficial to employers and employees alike in any organisation. The wide infiltration of spyware, malware and similarly suspicious downloads into personal devices has forced the government to reconsider its policies regarding data security. The malicious programs get downloaded onto the personal devices without the user even realising. This could disastrously affect the individuals and the governments. In the case of such an event, the BYODs become risky as they can make unauthorised policy changes and leak sensitive data into the public domain. This type of privacy breach leads to a domino effect with major legal and financial implications, and a decreased productivity for the organisations and governments. This presents a huge challenge as the governments have to consider the user rights and privacy laws and also protect the networks from these attacks. In this study, the researchers have proposed a novel technical framework that could assist the Saudi government. This framework was designed after determining the challenges that were faced by the government, based on the citizen perspectives, to control all risks challenging the use of the BYODs. This framework decreased the number of system restrictions and enforced access control policies for BYODs and cloud environments. The preliminary results of this study were positive and indicated that the framework could decrease the problems related to access control.http://www.sciencedirect.com/science/article/pii/S1110016822004896Bring Your Own Device (BYOD)Information managementSaudi Arabia
spellingShingle Khalid Almarhabi
Adel Bahaddad
Ahmed Mohammed Alghamdi
Security management of BYOD and cloud environment in Saudi Arabia
Alexandria Engineering Journal
Bring Your Own Device (BYOD)
Information management
Saudi Arabia
title Security management of BYOD and cloud environment in Saudi Arabia
title_full Security management of BYOD and cloud environment in Saudi Arabia
title_fullStr Security management of BYOD and cloud environment in Saudi Arabia
title_full_unstemmed Security management of BYOD and cloud environment in Saudi Arabia
title_short Security management of BYOD and cloud environment in Saudi Arabia
title_sort security management of byod and cloud environment in saudi arabia
topic Bring Your Own Device (BYOD)
Information management
Saudi Arabia
url http://www.sciencedirect.com/science/article/pii/S1110016822004896
work_keys_str_mv AT khalidalmarhabi securitymanagementofbyodandcloudenvironmentinsaudiarabia
AT adelbahaddad securitymanagementofbyodandcloudenvironmentinsaudiarabia
AT ahmedmohammedalghamdi securitymanagementofbyodandcloudenvironmentinsaudiarabia