Integrated NAC, MDM and BYOD monitoring SM beyond : (secured and monitored BYOD environment)
Date of Publication
2016
Document Type
Bachelor's Thesis
Degree Name
Bachelor of Science in Computer Science
Subject Categories
Computer Sciences | Information Security | OS and Networks
College
College of Computer Studies
Department/Unit
Computer Science
Thesis Adviser
Arlyn L. Ong
Defense Panel Chair
Jocelyn Cu
Defense Panel Member
Geanne Franco
Katrina Solomon
Abstract/Summary
The idea of introducing bring your own device to organizations (BYOD) is to allow employees of bringing and using their own computing device such as smartphones and tables to use enterprise applications and access data. The introduction of BYOD practice has been widely supported because it save costs, increase productivity and satisfies employees. However, it has brought a significant change in the field of securing and managing the organization's networks. Companies have to be wary of the threats such as security issues malwares, and bandwidth issues brought by the introduction of BYOD. Additionally, majority of the organizations do not enforce security policies. The study's proposed solution is an integrated NAC, MDM, BYOD monitoring, and automated response system that will greatly improve the security of the BYOD environment. NAC, MDM, and the response system provide an active way to secure the network while mobile monitoring provides a passive way of securing the network by monitoring, and logging all connected devices. With NAC present in the network, it is possible to authenticate users upon connecting to the network. After authenticating the users, MDM enforces security policies in order to secure the devices and the network together. With the availability of a secured NAC and MDM network, monitoring with automatic responses to violators is the next solution in order to see if the policies pushed by the MDM are enforced. Monitoring acts as another layer of security to the organization, as it tracks the enforcement of the MDM. While the response system provides a way to punish users who are deemed suspicious because of their violations towards the policies of the company. This study uses De La Salle University Manila as its test case for an enterprise system. It will adapt De La Salle University Manila's policies as guidelines for the implementation of policies whose goals are to secure and monitor the BYOD environment.
Abstract Format
html
Language
English
Format
Accession Number
TU18923
Shelf Location
Archives, The Learning Commons, 12F, Henry Sy Sr. Hall
Physical Description
1 volume (various foliations): illustrations (some color); 28 cm.
Keywords
Computer security; Computer networks -- Security measures
Recommended Citation
Del Valle, L. B., Kho, J. C., Ley, K. M., & Ong, J. V. (2016). Integrated NAC, MDM and BYOD monitoring SM beyond : (secured and monitored BYOD environment). Retrieved from https://animorepository.dlsu.edu.ph/etd_bachelors/6640