Threats and Vulnerabilities of Byod and Android

Submitted by: Submitted by

Views: 10

Words: 2713

Pages: 11

Category: Science and Technology

Date Submitted: 03/21/2016 02:08 PM

Report This Essay

International Journal of Research 

 Available at https://edupediapublications.org/journals 

p‐ISSN: 2348‐6848

e‐ISSN: 2348‐795X 

Volume 02 Issue 08 

August 2015 

  

Threats and Vulnerabilities of BYOD and Android

Sandip Yadav

SCIT, India

sandip.yadav@associates.scit.edu

Saurav Suman

SCIT, India

saurav.suman@associates.scit.edu 

Abstract

This

paper

discusses

about

the

vulnerabilities related to Bring-Your-OwnDevice (BYOD) wherein we have explored

the concept of containerization and the

vulnerability related to BYOD Container.

Some mitigation process has also been

suggested for this vulnerability. The

Second vulnerability - what we have tried

to highlight is- the vulnerability arising as

the Application Installation Permission

cannot be cancelled at the runtime. One

solution for this vulnerability dealt in the

literature is Context-related access

control. Paper has discussed some

limitation to that solution also and

proposed the solution for the same. We

have limited the discussion to Mobile

usage of BYOD wherein we have taken

Android phones as the base.

Available online: www.edupediapublications.org/journals 

 

Udyan Ganguly

SCIT, India

udyan.ganguly@associates.scit.edu

Dr. Priti Puri, Phd Assistant Professor

SCIT, India

puri_priti@rediffmail.com

Keywords

Bring Your Own Device (BYOD), Mobile

Device Management (MDM), Control

Objective, Android, Container, Context

related access control.

Introduction

Bring-Your-Own-Device (BYOD) assists

the users / developers in the businesses to

use their own devices to use the company

resources for both the professional and

their personal usage purpose. It may also

include accessing official documents,

applications and company network. In

2009[7], this idea was first time came into

the business environment when Intel

accepted the significance of workforce

using their personal devices for using

industry network and resources. In

2011[8], service providers of Information

Technology as Unisys and...