CFP last date
20 December 2024
Reseach Article

Barrier Free Internet Access: Evaluating the Cyber Security Risk Posed by the Adoption of Bring Your Own Devices to e-Learning Network Infrastructure

by E. T. Tchao, Richard Y. Ansah, Seth D. Kotey
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 3
Year of Publication: 2017
Authors: E. T. Tchao, Richard Y. Ansah, Seth D. Kotey
10.5120/ijca2017915581

E. T. Tchao, Richard Y. Ansah, Seth D. Kotey . Barrier Free Internet Access: Evaluating the Cyber Security Risk Posed by the Adoption of Bring Your Own Devices to e-Learning Network Infrastructure. International Journal of Computer Applications. 176, 3 ( Oct 2017), 53-62. DOI=10.5120/ijca2017915581

@article{ 10.5120/ijca2017915581,
author = { E. T. Tchao, Richard Y. Ansah, Seth D. Kotey },
title = { Barrier Free Internet Access: Evaluating the Cyber Security Risk Posed by the Adoption of Bring Your Own Devices to e-Learning Network Infrastructure },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2017 },
volume = { 176 },
number = { 3 },
month = { Oct },
year = { 2017 },
issn = { 0975-8887 },
pages = { 53-62 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number3/28536-2017915581/ },
doi = { 10.5120/ijca2017915581 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:41:34.909318+05:30
%A E. T. Tchao
%A Richard Y. Ansah
%A Seth D. Kotey
%T Barrier Free Internet Access: Evaluating the Cyber Security Risk Posed by the Adoption of Bring Your Own Devices to e-Learning Network Infrastructure
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 3
%P 53-62
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The adoption of Bring Your Own Device (BYOD) – also known as Bring Your Own Technology (BYOT), Bring Your Own Phone (BYOP), or Bring Your Own Personal Computer (BYOPC) – is a policy which allows people access to privileged resources, information and services available on the private computer network of an organization using their own personal computer devices. BYOD, since its emergence in 2009, courtesy of Intel, is now a common practice in many organizations. Academic institutions that attempt to implement BYOD, can derive many benefits as well as many risks to its network infrastructure, largely security-based. This paper presents an assessment of a WLAN network which has been deployed for a campus-wide data centric e-learning platform at Kwame Nkrumah University of Science and Technology (KNUST) towards the overall objective of achieving a barrier free internet access to enhance the teaching and learning process at the university. The paper subsequently evaluates the WLAN infrastructure, its accompanying BYOD set-up, and associated likely security risks and threats, and recommends appropriate solutions.

References
  1. Forouzan, B. A., 2013. Data Communications and Networking. 5th ed. s.l.:McGraw-Hill.
  2. Bosworth, S., Kabay, M. E. & Whyne, E., 2014. Computer Security Handbook. 6th ed. s.l.:John Wiley & Sons, Inc..
  3. Vacca, J. R. & Mallery, J., 2013. Chapter 1: Building a Secure Organisation. In: Computer and Information Security Handbook. 2nd ed. s.l.:Morgan Kaufmann Publications (MK), pp. 3-24.
  4. Wu, C.-H. (. & Irwin, J. D., 2013. Introduction to Computer Networks and Cybersecurity. s.l.:CRC Press - Taylor & Francis Group.
  5. Fortinet Solutions Guide, 2015. Secure Wireless LAN Solution Guide - Complete WiFi Security for Any Network Topology, s.l.: Fortinet Inc..
  6. Brown, J., Jackson, S. & Scarfone, K., 2013. Securing BYOD - Guidance on the Strategies and Tools Needed for a Secure and Productive Bring-Your-Own-Device Program, s.l.: CDW-G.
  7. Cisco Systems, Inc., 2014. Cisco Enterprise Mobility Solution - Device Freedom Without Compromising the IT Network, s.l.: Cisco Systems Inc..
  8. Gartner Press, 2013. Worldwide PC, Tablet and Mobile Phone Combined Shipments to Reach 2.4 Billion units in 2013. [Online] Available at: http://www.gartner.com/ newsroom/id/2408515 [Accessed 2016].
  9. Harkins, M., 2016. Mobile: Learn from Intel's Cisco on Securing Employee-Owned Devices. [Online] Available at: http://www.govinfosecurity.com/webinars/mobile-learn-from-intels-ciso-on-securing-employee-owned-devices-w-264 [Accessed 19 April 2016].
  10. Bradley, T., 2011. PC World - Pros and Cons of Bringing Your Own Device to Work. [Online] Availableat:http://www.pcworld.com/article/246760/pros_and_cons_of_byod_bring_your_own_device_.html[Accessed 19 April 2016].
  11. Intel, 2012. Insights on the Current State of BYOD in the Enterprise, s.l.: Intel.
  12. Aruba Networks, Inc., 2016. The Definitive Guide to BYOD. s.l.:Aruba Networks Inc..
  13. Wikipedia, 2016. Bring Your Own Device. [Online] Availableat:https://en.wikipedia.org/wiki/Bring_your_own_device[Accessed 19 April 2016].
  14. Johnson, K. & Filkins, B. L., 2012. SANS Mobility/BYOD Security Survey, s.l.: SANS Institute.
  15. MCNC, 2012. Designing and Building a Campus Wireless Network, s.l.: MCNC for the K-12 Community of North Carolina.
  16. Cisco Systems, Inc., 2014. Campus Wireless LAN Technology Design Guide. s.l.:Cisco Systems, Inc..
  17. Chin, D., 2013. Whitepaper - Best Practices for High Desnsity Network Design in Education and Small/Medium Businesses, s.l.: NETGEAR Inc..
  18. Coova, 2016. Coova.org Projects. [Online] Available at: http://coova.github.io/CoovaChilli/ [Accessed 2016].
  19. Beaver, K. & Davis, P. T., 2005. Hacking Wireless Networks for Dummies. s.l.:Wiley & Sons, Inc..
  20. TechTarget, 2006. Wired Equivalent Privacy (WEP). [Online]Availableat:http://searchsecurity.techtarget.com/definition/Wired-Equivalent-Privacy [Accessed 2016].
  21. Wikipedia, 2016. Wired Equivalent Privacy. [Online] Availableat:https://en.wikipedia.org/wiki/Wired_Equivalent_Privacy [Accessed 2016].
  22. Beaver, K., 2016. Enterprise Wireless Security: Secure Wi-Fi Today and Beyond. [Online] Availableat:http://searchsecurity.techtarget.com/tip/Enterprise-wireless-security-Secure-Wi-Fi-today-and-beyond[Accessed 2016].
  23. Wikipedia, 2016. WPA. [Online] Available at: https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access [Accessed 2016].
  24. Grimes, R. A., 2010. Isolated Security Zones Yield Stronger Network Protection. [Online] Availableat:http://www.infoworld.com/article/2628540/malware/isolated-security-zones-yield-stronger-network-protection.html[Accessed 2016].
  25. Buchholz, D., Dunlop, J. & Ross, A., 2012. Whitepaper: Improving Security and Mobility for Personally Owned Devices. s.l.:Intel Corporation.
  26. Short, T., 2013. 3 Ways Intel Gets Employees to Trust (and Adhere to) Their BYOD Security Program. [Online] Available at: http://hello-operator.softwareadvice.com/3-ways-intel-gets-employees-to-trust-their-byod-program-1113/ [Accessed 2016].
  27. Cisco Systems, Inc., 2012. Whitepaper - BYOD Security Challenges in Education: Protect the Network, Information, and Students, s.l.: Cisco Systems Inc..
  28. Aruba Networks, Inc., 2012. Aruba Whitepaper - Conquering Today's Bring Your Own Device Challenges: A Framework for Successful BYOD Initiatives, s.l.: Aruba Networks Inc..
  29. EYGM Limited, 2013. Bring Your Own Device: Security and Risk Considerations for Your Mobile Device Program, s.l.: EYGM Limited.
  30. Aruba Networks, Inc., 2012. Aruba Whitepaper - The Whys and Hows of Deploying Large-Scale Campus-wide WiFi Networks, s.l.: Aruba Networks Inc..
  31. Cisco Systems, Inc., 2015. Cisco Reference Design - Campus LAN and Wireless LAN Design Guide. s.l.:Cisco Systems, Inc..
  32. Hagen, S., 2014. IPv6 Essentials. 3rd ed. s.l.:O'Reilly Media, Inc..
  33. McFarland, S., 2011. Deploying IPv6 in Campus Networks. s.l.:Cisco Systems, Inc..
  34. Reichenberg, N., 2014. Imporving Security via Proper Network Segmentation. [Online] Availableat:http://www.securityweek.com/improving-security-proper-network-segmentation [Accessed 2016].
  35. Cisco Systems, Inc., 2016. Wireless Education Vertical. s.l.:Cisco Systems, Inc..
  36. GlobalSign, 2016. Whitepaper - Taking BYOD Too Far: How to Avoid the Pitfalls of Striving for BYOD Utopia, s.l.: GlobalSign.
  37. Cisco Systems, Inc., 2014. Cisco Unified Access (UA) and Bring Your Own Device (BYOD) CVD. s.l.:Cisco Systems, Inc..
  38. Wikipedia, 2016. DNS Hijacking. [Online] Availableat:https://en.wikipedia.org/wiki/DNS_hijacking.
Index Terms

Computer Science
Information Sciences

Keywords

Bring Your Own Device e-learning organizational perceptions Network infrastructure Campus Area Network BYOD policies.