A Detailed Review on Security Issues of Bring Your Own Devices (BYODs)

  • Sarita Sushil Gaikwad, Dr. Aparna Junnarkar


In recent days, Bring Your Own Device (BYOD) has turn out to be one of the most popular model for the enterprises that providing mobility and flexibility in work-places. The emergence of latest innovations and features of mobile devices makes them integral part of every aspect of everyday business activities. Furthermore, these mobile networks are now well integrated with the Internet, personal devices can be used in BYOD to raise employee satisfaction while lowering system costs. In comparison to computers and computer networks, mobile devices are not well secured, and users pay less attention to security updates and solutions. As a result, as workers use their own mobile devices to access an organization's data and systems, mobile security has become a critical problem in BYOD. However, because of new threats and resource constraints on computing machines, it's difficult to trust these devices with access to sensitive proprietary data. As a result, the possible attacks (e.g. Advanced Persistent Threat (APT) and malware) of BYOD and a taxonomy of BYOD attacks are presented in this article. Also, we present a summary of the current state of BYOD protection in this article and address it.