Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/1541
Full metadata record
DC FieldValueLanguage
dc.contributor.authorOlalere, Morufu-
dc.contributor.authorAbdullah, Mohd Taufik-
dc.contributor.authorMahmod &, Ramlan-
dc.contributor.authorazizol, Abdullah-
dc.date.accessioned2021-06-05T17:15:36Z-
dc.date.available2021-06-05T17:15:36Z-
dc.date.issued2016-01-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/1541-
dc.description.abstractIn this paper, the security challenges of BYOD are discussed, including existing security solutions which often are too restrictive. Data leakage is one of the security challenges confronting BYOD. Data leakage can occur as a result of stolen, lost or compromised employee devices. When an employee device is stolen, lost or comprised, an attacker can obtain access directly to the enterprise data on the employee device if a strong authentication technique is not in place. The traditional means of authenticating employees when connecting to an enterprise server in a traditional network environment which relies on either knowledge or ownership is too weak for the BYOD environment. In such a traditional enterprise network, employees obtain access to an enterprise server using their respective stationary desktop, while in a BYOD environment access to an enterprise server is from anywhere, making it easy for an attacker in possession of an employee device and password to gain unauthorised access. To address this problem, there is need for a strong authentication technique. This study proposes a theoretical framework for a two-factor authentication method that combines knowledge-based (Password) and biometric-based (Keystroke dynamic) features for authentication of mobile devices in a BYOD environment. Technical details on how the framework can be implemented are presented. It is the belief of the authors that proper implementation of the proposed potential future application framework will go a long way in addressing the problem of data leakage in a BYOD environment.en_US
dc.language.isoenen_US
dc.subjectBYODen_US
dc.subjectMobile Deviceen_US
dc.subjectAuthenticationen_US
dc.subjectBiometricen_US
dc.subjectKeystroke Dynamicen_US
dc.titleBring Your Own Device: Security Challenges and A theoretical Framework for Two-Factor Authenticationen_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
olalere et al 2016_BYOD.pdf435.16 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.