Bring your own device: security challenges and a theoretical framework for two-factor authentication
In this paper, the security challenges of BYOD are discussed, including existing security solutions which often are too restrictive. Data leakage is one of the security challenges confronting BYOD. Data leakage can occur as a result of stolen, lost or compromised employee devices. When an employee d...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Dorma Trading Est
2016
|
Online Access: | http://psasir.upm.edu.my/id/eprint/55224/1/Bring%20your%20own%20device%20security%20challenges%20and%20a%20theoretical%20framework%20for%20two-factor%20authentication.pdf |