TY - GEN
T1 - A cybersecurity model for mobile devices aimed at SMEs that use freelancers and BYOD schemes
AU - Bruderer, Ramon
AU - Villena, Moises
AU - Tupia, Manuel
AU - Bruzza, Mariuxi
N1 - Publisher Copyright:
© 2018 IADIS. All rights reserved.
PY - 2018
Y1 - 2018
N2 - Small and Medium Sized enterprises (SMSs) that provide services related to information and communications technologies (ICT) have developed a human resources scheme with its labor force being mainly made up of freelancers. These companies’ lower costs even in infrastructure by allowing this kind of employees to use their own computer equipment (e.g., computers, servers, multiple devices) following the Bring Your Own Device (BYOD) mode. However, this results in more vulnerable devices to cyberattacks. This article intends to put forward a cybersecurity management model applicable to this type of companies, oriented to mobile devices which allow for securing confidentiality, integrity and availability of the information managed by them. This model is composed of three main components: processes, management indicators or metrics and the implementation guide of the model itself. ISO 27032 standards and NIST standards have been mainly used. Meanwhile, to test the model’s validity, the expert judgment will be used as a validation tool.
AB - Small and Medium Sized enterprises (SMSs) that provide services related to information and communications technologies (ICT) have developed a human resources scheme with its labor force being mainly made up of freelancers. These companies’ lower costs even in infrastructure by allowing this kind of employees to use their own computer equipment (e.g., computers, servers, multiple devices) following the Bring Your Own Device (BYOD) mode. However, this results in more vulnerable devices to cyberattacks. This article intends to put forward a cybersecurity management model applicable to this type of companies, oriented to mobile devices which allow for securing confidentiality, integrity and availability of the information managed by them. This model is composed of three main components: processes, management indicators or metrics and the implementation guide of the model itself. ISO 27032 standards and NIST standards have been mainly used. Meanwhile, to test the model’s validity, the expert judgment will be used as a validation tool.
KW - BYOD
KW - Cybersecurity model
KW - Information security
KW - Mobile devices
KW - SME
UR - http://www.scopus.com/inward/record.url?scp=85052513361&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:85052513361
SN - 9789898533746
T3 - Proceedings of the 11th IADIS International Conference Information Systems 2018, IS 2018
SP - 129
EP - 136
BT - Proceedings of the 11th IADIS International Conference Information Systems 2018, IS 2018
A2 - Isaias, Pedro
A2 - Nunes, Miguel Baptista
A2 - Powell, Philip
A2 - Rodrigues, Luis
PB - IADIS
T2 - 11th IADIS International Conference Information Systems 2018, IS 2018
Y2 - 14 April 2018 through 16 April 2018
ER -