An Analysis Of Byod Architectures In Relation To Mitigating Security Risks