Sokolov, Volodymyr та Skladannyi, Pavlo (2025) Developing a Balanced Security Policy for Bring Your Own Device in Corporate Networks Колективна (три і більше авторів). Estonia, Scientific Center of Innovative Research.
|
Текст
V_Sokolov_P_Skladannyi_ITSC_2025.pdf Download (2MB) |
Анотація
With the rapid expansion of personal device usage in corporate environments, the Bring Your Own Device (BYOD) concept introduces significant cybersecurity challenges. This study focuses on formalizing and systematizing approaches to securing BYOD-enabled infrastructures within organizations. A comprehensive architecture is proposed based on seven interconnected models: a risk assessment model, Multi-Factor Authentication (MFA) model, a Zero Trust (ZT) access control model, an encryption security model, a network segmentation model, a security monitoring and response model, and a User Behavior Analytics (UBA) model. Each model is presented in a formal mathematical form, enabling quantitative evaluation of security metrics and adaptive protection aligned with real-time threat conditions. The architecture reflects a defense-in-depth principle, where safeguards at others mitigate weaknesses at one layer. The interaction between components forms a closed-loop system of analysis, control, and response in which user and device risk profiles influence access policies, authentication mechanisms, and monitoring intensity. Special emphasis is placed on dynamic trust evaluation and adaptive response based on behavioral anomalies. The models can be applied to design, assess, and optimize enterprise security frameworks in BYOD scenarios. The integration of these models allows for a highly modular and scalable approach to enterprise security, where a combination of statistical inference, user context, and technical indicators drives decision-making. This multi-factor model enhances resilience by enabling proactive detection and isolation of threats, ensuring that access decisions are granular and risk-aware. Formal metrics also support auditing, compliance, and continual improvement processes across diverse regulatory environments. Finally, directions for future research are outlined, including empirical validation of the models, integration of machine learning techniques, enhancement of behavioral analytics, and incorporation of economic cost models. The proposed approach provides a foundation for building secure, flexible, and scalable BYOD security systems in the era of digital mobility.
| Тип елементу : | Монографія (Колективна (три і більше авторів)) |
|---|---|
| Ключові слова: | BYOD, Risk Assessment; Zero Trust Architecture; Multi-Factor Authentication; Encryption; Network Segmentation; User Behavior Analytics; Security Monitoring; Access Control; Cybersecurity Modeling |
| Типологія: | Монографії > Видані в іноземному видавництві мовами ОЕСР/ЄС |
| Підрозділи: | Факультет інформаційних технологій та математики > Кафедра інформаційної та кібернетичної безпеки ім. професора Володимира Бурячка |
| Користувач, що депонує: | Павло Миколайович Складанний |
| Дата внесення: | 13 Лют 2026 10:20 |
| Останні зміни: | 13 Лют 2026 10:21 |
| URI: | https://elibrary.kubg.edu.ua/id/eprint/56408 |
Actions (login required)
![]() |
Перегляд елементу |


