I selected a research topic as Lack of security in personal devices over devices provided by an organization and submitted a sample proposal to prof (attached). I would need a presentation of 15 slide

Lack of security in personal devices over devices provided by an organization

Research proposal Overview

The current trends show increase in use of personal devices for professional work, but the risks involved with this practice is very high due to lack of control over such devices. Some of the common security issues that arise due to devices that are brought for work related activities are insecure network connections, lost or stolen device, malware targeting these devices, intervention of third-party applications. When coming to the devices at work the access is restricted and standard security procedures are laid on these devices. It will be difficult for hackers to intervene these devices with a strict layer of firewalls around them.

This research classified the issues of access control using personal devices into three main categories. First, a trust which refers to how much access does an organization provides to their employees connecting to applications from a remote location even with an unknown device. Second, a protection which refers to preserving data even when devices are lost or stolen. Third, a control which refers to how an organization enforce compliance with corporate guidelines when the user is on the move (Tokuyoshi, 2013). We will try to investigate on the issues related to access control using the personal devices by dividing them into five main categories.

  1. Mobile device security issues

  2. Lack of access control enforcement

  3. Lack of data and policy protection

  4. Platform dependent

  5. Unaware of procedures and rights

The main aim of this research is to investigate the most recent trends touching on the access control issues in using personal devices concerning information security and also to analyze the essential and comprehensive requirements needed to develop an access control framework in the future.

References

B. Tokuyoshi, "The security implications of BYOD," Network Security, vol. 2013, pp. 12-13, 2013.

J. Pinchot and K. Paullet, "BRING YOUR OWN DEVICE TO WORK: BENEFITS, SECURITY RISKS, AND GOVERNANCE ISSUES," Issues in Information Systems, vol. 16, 2015.