Author

Nabiha Usmani

Degree

Master of Science in Computer Science

Department

Department of Computer Science

Faculty / School

Faculty of Computer Sciences (FCS)

Date of Submission

2018-01-01

Supervisor

Waqas Mahmood, Visiting Faculty, Department of Computer Science

Document type

MSCS Survey Report

Abstract

Data is a critically imperative asset that has been utilized for a considerable length of time in an organization. Similar to any asset, there are dangers to the data that affect processes, for example, electronic mail recovery and right of access to corporate structure services. As a result of the threats, consideration towards protecting and securing the data is necessary. Technology is used for securing data and the charge partnered to the innovation can be dire. As technology develops with each transient decade, there are diverse phenomenon's that endeavor to process and secure organizational data while reducing cost. The advancement of technology has built up another trend called "Bring Your Own Device"- (BYOD). BYOD is a wonder that allows employees to utilize their very own mobile device to finish the organizational assigned tasks. The implementation of BYOD extends from huge companies to small, intermediate and micro enterprises (SMMEs). With the acceptance of BYOD, there are advantages as well as risks related to it. Traditionally; corporate-level security risks have been catered by adapting a variety of conventional Information Security (IS) methods. This research work aims to recognize how many corporate-level employees are aware of this phenomenon, in this research a survey is conducted online which incorporated questions on awareness, effects, and benefits of BYOD were asked. Moreover, questions regarding the presence of network policies and audit plans for ensuring data security at their organizations were present. Later on, after the identification of these key factors based on our survey results, we presented an analysis of risks associated with BYOD and ways of mitigating them.

The full text of this document is only accessible to authorized users.

Share

COinS