Abstract
The rise of the Bring Your Own Device (BYOD) trend has introduced new challenges in securing corporate data on personal devices. As organisations increasingly allow employees to use personal devices for work purposes, the need for robust security measures has become paramount. This dissertation explored the development of a secure framework for managing corporate data on personal devices in a BYOD environment using Containerisation and other security techniques. Containerisation is a lightweight virtualisation method that provides a separate and secure space for work-related data and applications, ensuring complete data separation, privacy, and flexibility. The study also investigated the role of Enterprise Mobility Management (EMM) systems, including Mobile Device Management (MDM), in enforcing security policies and managing mobile devices within an enterprise. Furthermore, integrating Multi-Factor Authentication (MFA) provided an additional layer of security, protecting corporate data from unauthorised access.
The research methodology involved an in-depth analysis of existing literature on BYOD security, Containerisation, and EMM systems, followed by developing a conceptual framework to address the identified security challenges. This framework was then evaluated through a Proof of Concept (PoC) to assess its effectiveness in securing corporate data on personal devices. The expected results of this study included the successful implementation of a secure framework that can be utilised in BYOD environments, ensuring the protection of corporate data while maintaining user privacy. The findings of this research contribute to the ongoing discourse on mobile security and BYOD security, providing a practical solution for organisations seeking to safeguard their data in a rapidly evolving technological landscape.
Additionally, this dissertation comprehensively examines the limitations and future directions for enhancing mobile security in BYOD environments. The proposed ShieldDroid Enterprise framework was evaluated for its scalability, adaptability, and ease of integration with existing EMM systems. This study also addressed the potential challenges of implementing the framework in diverse organisational settings and suggested strategies for overcoming those obstacles. The results and recommendations
iii
presented in this research offer valuable insights for IT managers, security professionals, and policymakers aiming to strengthen the security posture of BYOD deployments and protect sensitive corporate data from emerging threats.