Security Attacks Taxonomy on Bring Your Own Devices (BYOD) Model

Download Now
Provided by: Academy & Industry Research Collaboration Center
Topic: Security
Format: PDF
Mobile devices, specifically Smartphone's, have become ubiquitous. For this reason, businesses are starting to develop \"Bring Your Own Device\" (BYOD) policies to allow their employees to use their owned devices in the workplace. BYOD offers many potential advantages: enhanced productivity, increased revenues, reduced mobile costs and IT efficiencies. However, due to emerging attacks and limitations on device resources, it is difficult to trust these devices with access to critical proprietary information. Therefore, in this paper, the potential attacks of BYOD and taxonomy of BYOD attacks are presented.
Download Now

Find By Topic