Bring your own device: security challenges and a theoretical framework for two-factor authentication
In this paper, the security challenges of BYOD are discussed, including existing security solutions which often are too restrictive. Data leakage is one of the security challenges confronting BYOD. Data leakage can occur as a result of stolen, lost or compromised employee devices. When an employee d...
Saved in:
| Main Authors: | , , , |
|---|---|
| 格式: | Article |
| 语言: | English |
| 出版: |
Dorma Trading Est
2016
|
| 在线阅读: | http://psasir.upm.edu.my/id/eprint/55224/1/Bring%20your%20own%20device%20security%20challenges%20and%20a%20theoretical%20framework%20for%20two-factor%20authentication.pdf |
| 标签: |
添加标签
没有标签, 成为第一个标记此记录!
|
