Author : Dr. Khan Rahat Afreen 1
Date of Publication :8th February 2018
Abstract: COBIT is a business framework for management and governance of enterprise IT, provided by ISACA, an international professional association focused on IT Governance. As per ISACA, “COBIT helps IT professionals and enterprise leaders fulfill their IT governance and management responsibilities, particularly in the areas of assurance, security, risk and control, and deliver value to the business.†BYO bring your own is a concept where employees can use their own systems, software, technology for the purpose of accomplishing organizational tasks. It is gaining rapid acceptance by the employers although it has a lot of challenges. COBIT can be the answer to the many questions faced while framing organizational policies around BYOD. While implementing BYOD, major challenges faced are not only from its technical implementation aspect but also from policy implementation and monitoring aspect. Companies may lose sensitive data if it resides on employee-owned devices. COBIT documentation provided by ISACA supports many of the essential causes that are a reason for BYOD initiative. The seven enablers provide an effective foundation for any organization to embrace BYOD policy in a well-structured manner
Reference :
-
- COBIT 5 – A Business Framework for the Governance and Management of Enterprise IT, ISACA, October, 2012
- Keith W. Miller, Jeffrey Voas, George F Hurlburt, “BYOD:Security and Privacy Considerations” , IEEE Computer Society, IT Professional, Volume: 14, Issue: 5, Pp 53-55, Sept.-Oct. 2012.
- How Employee Negligence Can Put Your Company's Data at Risk [online]. Available: http://www.forbes.com/sites/thesba/2015/06/09/data-breachyour-business/#58c79c3f14aa, [accessed 15, February 2017, 10:55am]
- Neal Leavitt, “Today’s Mobile Security requires a New Approach”, IEEE Computer Society, Computer,Volume: 46, Issue: 11, Pp 16-19, Nov. 2013
- Elise Ackerman, “The Bring Your Own Device DelimmaEmployees and businesses seek to balance privacy and security, Resources at work”, IEEE Spectrum, Volume: 50, Issue: 8, Pp 22-22, August 2013.