Developing a Balanced Security Policy for Bring Your Own Device in Corporate Networks

Sokolov, Volodymyr та Skladannyi, Pavlo (2025) Developing a Balanced Security Policy for Bring Your Own Device in Corporate Networks Колективна (три і більше авторів). Estonia, Scientific Center of Innovative Research.

[thumbnail of V_Sokolov_P_Skladannyi_ITSC_2025.pdf] Текст
V_Sokolov_P_Skladannyi_ITSC_2025.pdf

Download (2MB)
Офіційне посилання: https://mono.scnchub.com/index.php/book/catalog/bo...

Анотація

With the rapid expansion of personal device usage in corporate environments, the Bring Your Own Device (BYOD) concept introduces significant cybersecurity challenges. This study focuses on formalizing and systematizing approaches to securing BYOD-enabled infrastructures within organizations. A comprehensive architecture is proposed based on seven interconnected models: a risk assessment model, Multi-Factor Authentication (MFA) model, a Zero Trust (ZT) access control model, an encryption security model, a network segmentation model, a security monitoring and response model, and a User Behavior Analytics (UBA) model. Each model is presented in a formal mathematical form, enabling quantitative evaluation of security metrics and adaptive protection aligned with real-time threat conditions. The architecture reflects a defense-in-depth principle, where safeguards at others mitigate weaknesses at one layer. The interaction between components forms a closed-loop system of analysis, control, and response in which user and device risk profiles influence access policies, authentication mechanisms, and monitoring intensity. Special emphasis is placed on dynamic trust evaluation and adaptive response based on behavioral anomalies. The models can be applied to design, assess, and optimize enterprise security frameworks in BYOD scenarios. The integration of these models allows for a highly modular and scalable approach to enterprise security, where a combination of statistical inference, user context, and technical indicators drives decision-making. This multi-factor model enhances resilience by enabling proactive detection and isolation of threats, ensuring that access decisions are granular and risk-aware. Formal metrics also support auditing, compliance, and continual improvement processes across diverse regulatory environments. Finally, directions for future research are outlined, including empirical validation of the models, integration of machine learning techniques, enhancement of behavioral analytics, and incorporation of economic cost models. The proposed approach provides a foundation for building secure, flexible, and scalable BYOD security systems in the era of digital mobility.

Тип елементу : Монографія (Колективна (три і більше авторів))
Ключові слова: BYOD, Risk Assessment; Zero Trust Architecture; Multi-Factor Authentication; Encryption; Network Segmentation; User Behavior Analytics; Security Monitoring; Access Control; Cybersecurity Modeling
Типологія: Монографії > Видані в іноземному видавництві мовами ОЕСР/ЄС
Підрозділи: Факультет інформаційних технологій та математики > Кафедра інформаційної та кібернетичної безпеки ім. професора Володимира Бурячка
Користувач, що депонує: Павло Миколайович Складанний
Дата внесення: 13 Лют 2026 10:20
Останні зміни: 13 Лют 2026 10:21
URI: https://elibrary.kubg.edu.ua/id/eprint/56408

Actions (login required)

Перегляд елементу Перегляд елементу