Submitted by: Submitted by sandeepscit
Views: 10
Words: 2713
Pages: 11
Category: Science and Technology
Date Submitted: 03/21/2016 02:08 PM
International Journal of Research
Available at https://edupediapublications.org/journals
p‐ISSN: 2348‐6848
e‐ISSN: 2348‐795X
Volume 02 Issue 08
August 2015
Threats and Vulnerabilities of BYOD and Android
Sandip Yadav
SCIT, India
sandip.yadav@associates.scit.edu
Saurav Suman
SCIT, India
saurav.suman@associates.scit.edu
Abstract
This
paper
discusses
about
the
vulnerabilities related to Bring-Your-OwnDevice (BYOD) wherein we have explored
the concept of containerization and the
vulnerability related to BYOD Container.
Some mitigation process has also been
suggested for this vulnerability. The
Second vulnerability - what we have tried
to highlight is- the vulnerability arising as
the Application Installation Permission
cannot be cancelled at the runtime. One
solution for this vulnerability dealt in the
literature is Context-related access
control. Paper has discussed some
limitation to that solution also and
proposed the solution for the same. We
have limited the discussion to Mobile
usage of BYOD wherein we have taken
Android phones as the base.
Available online: www.edupediapublications.org/journals
Udyan Ganguly
SCIT, India
udyan.ganguly@associates.scit.edu
Dr. Priti Puri, Phd Assistant Professor
SCIT, India
puri_priti@rediffmail.com
Keywords
Bring Your Own Device (BYOD), Mobile
Device Management (MDM), Control
Objective, Android, Container, Context
related access control.
Introduction
Bring-Your-Own-Device (BYOD) assists
the users / developers in the businesses to
use their own devices to use the company
resources for both the professional and
their personal usage purpose. It may also
include accessing official documents,
applications and company network. In
2009[7], this idea was first time came into
the business environment when Intel
accepted the significance of workforce
using their personal devices for using
industry network and resources. In
2011[8], service providers of Information
Technology as Unisys and...