Security attacks taxonomy on bring your own devices (BYOD) model

Mobile devices, specifically smartphones, have become ubiquitous. For this reason, businesses are starting to develop “Bring Your Own Device” policies to allow their employees to use their owned devices in the workplace. BYOD offers many potential advantages: enhanced productivity, increased revenue...

Full description

Bibliographic Details
Main Authors: Singh, Manmeet Mahinderjit, Soh, Sin Siang, Oh, Ying San, Malim, Nurul Hashimah Ahamed Hassain, Shariff, Azizul Rahman Mohd
Format: Article
Language:English
Published: Wireilla 2014
Subjects:
Online Access:http://eprints.usm.my/47317/
http://eprints.usm.my/47317/1/SECURITY_ATTACKS_TAXONOMY_ON_BRING_YOUR.pdf
_version_ 1848880838733725696
author Singh, Manmeet Mahinderjit
Soh, Sin Siang
Oh, Ying San
Malim, Nurul Hashimah Ahamed Hassain
Shariff, Azizul Rahman Mohd
author_facet Singh, Manmeet Mahinderjit
Soh, Sin Siang
Oh, Ying San
Malim, Nurul Hashimah Ahamed Hassain
Shariff, Azizul Rahman Mohd
author_sort Singh, Manmeet Mahinderjit
building USM Institutional Repository
collection Online Access
description Mobile devices, specifically smartphones, have become ubiquitous. For this reason, businesses are starting to develop “Bring Your Own Device” policies to allow their employees to use their owned devices in the workplace. BYOD offers many potential advantages: enhanced productivity, increased revenues, reduced mobile costs and IT efficiencies. However, due to emerging attacks and limitations on device resources, it is difficult to trust these devices with access to critical proprietary information. Therefore, in this paper, the potential attacks of BYOD and taxonomy of BYOD attacks are presented. Advanced persistent threat (APT) and malware attack are discussed in depth in this paper. Next, the proposed solution to mitigate the attacks of BYOD is discussed. Lastly, the evaluations of the proposed solutions based on the X. 800 security architecture are presented.
first_indexed 2025-11-15T18:09:29Z
format Article
id usm-47317
institution Universiti Sains Malaysia
institution_category Local University
language English
last_indexed 2025-11-15T18:09:29Z
publishDate 2014
publisher Wireilla
recordtype eprints
repository_type Digital Repository
spelling usm-473172020-09-18T01:29:47Z http://eprints.usm.my/47317/ Security attacks taxonomy on bring your own devices (BYOD) model Singh, Manmeet Mahinderjit Soh, Sin Siang Oh, Ying San Malim, Nurul Hashimah Ahamed Hassain Shariff, Azizul Rahman Mohd QA75.5-76.95 Electronic computers. Computer science Mobile devices, specifically smartphones, have become ubiquitous. For this reason, businesses are starting to develop “Bring Your Own Device” policies to allow their employees to use their owned devices in the workplace. BYOD offers many potential advantages: enhanced productivity, increased revenues, reduced mobile costs and IT efficiencies. However, due to emerging attacks and limitations on device resources, it is difficult to trust these devices with access to critical proprietary information. Therefore, in this paper, the potential attacks of BYOD and taxonomy of BYOD attacks are presented. Advanced persistent threat (APT) and malware attack are discussed in depth in this paper. Next, the proposed solution to mitigate the attacks of BYOD is discussed. Lastly, the evaluations of the proposed solutions based on the X. 800 security architecture are presented. Wireilla 2014-10 Article PeerReviewed application/pdf en http://eprints.usm.my/47317/1/SECURITY_ATTACKS_TAXONOMY_ON_BRING_YOUR.pdf Singh, Manmeet Mahinderjit and Soh, Sin Siang and Oh, Ying San and Malim, Nurul Hashimah Ahamed Hassain and Shariff, Azizul Rahman Mohd (2014) Security attacks taxonomy on bring your own devices (BYOD) model. International Journal of Mobile Network Communications & Telematics ( IJMNCT), 4 (5). pp. 1-17. ISSN 1839-5678 https://wireilla.com/ijmnct/vol4.html
spellingShingle QA75.5-76.95 Electronic computers. Computer science
Singh, Manmeet Mahinderjit
Soh, Sin Siang
Oh, Ying San
Malim, Nurul Hashimah Ahamed Hassain
Shariff, Azizul Rahman Mohd
Security attacks taxonomy on bring your own devices (BYOD) model
title Security attacks taxonomy on bring your own devices (BYOD) model
title_full Security attacks taxonomy on bring your own devices (BYOD) model
title_fullStr Security attacks taxonomy on bring your own devices (BYOD) model
title_full_unstemmed Security attacks taxonomy on bring your own devices (BYOD) model
title_short Security attacks taxonomy on bring your own devices (BYOD) model
title_sort security attacks taxonomy on bring your own devices (byod) model
topic QA75.5-76.95 Electronic computers. Computer science
url http://eprints.usm.my/47317/
http://eprints.usm.my/47317/
http://eprints.usm.my/47317/1/SECURITY_ATTACKS_TAXONOMY_ON_BRING_YOUR.pdf