Bring Your Own Device (BYOD) has become an established business practice, however the practice can increase an organisation’s information security risks. The implementation of a BYOD policy for laptops must consider how the information security risks can be mitigated or managed. The selection of an appropriate secure laptop software configuration is an important part of the information security risk mitigation/management strategy. This paper considers how a secure laptop software configuration, the Mobile Execution Environment (MEE) can be used to minimise risks when a BYOD policy for laptops is implemented. In this paper the security and business risks associated with the implementation of such a policy are identified and discussed before giving an overview of a range of laptop software configuration options suitable for the implementation of a secure BYOD policy. The design objectives and security requirements of the MEE are enumerated and its key features described. For each identified risk, the MEE features that mitigate/manage the risk are presented. The paper concludes by considering the type of work for which the MEE is most suited and also how the security features of the MEE can be enhanced when the MEE forms part of a secure portable execution and storage environment.
[1]
Craig Valli,et al.
The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market
,
2008,
J. Digit. Forensics Secur. Law.
[2]
Peter James.
Are existing security models suitable for teleworking
,
2011
.
[3]
Igor Bernik,et al.
Mobile Devices and Corporate Data Security
,
.
[4]
Peter James,et al.
Fireguard - A Secure Browser with Reduced Forensic Footprint
,
2010
.
[5]
Peter James.
Secure Portable Execution Environments: A Review of Available Technologies
,
2008
.
[6]
Craig Valli,et al.
The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market
,
2006,
J. Digit. Forensics Secur. Law.