Abstract

Increased demand for Bring Your Own Device (BYOD) service enablement becomes an integral part of the critical infrastructure due to business agility, increase employee productivity, and employee satisfaction as an alternate method of the working environment. But unauthorized malicious access of critical infrastructure from the BYOD environment increased the cyber-attack which becomes a major cybersecurity risk for most organizations as a result business ecosystem gets fragmented. There are many methods and techniques developed in recent years to reduce cyber attacks in this area which solves multiple open issues. But due to new attack techniques and tools again development is an on-going requirement. Most of the organization is adopting secure certificate-based authentication mechanism to enable BYOD environment. But the certificate-based authentication mechanism has also many challenges that open a loophole for unauthorized access. Apart from this Cyber forensic digital investigation ecosystem development becomes an important requirement to conduct post-incident analysis, investigation, and to produce evidence of the crime. In this research, post-analysis of unauthorized malicious activities in the BYOD environment Detection Technique is proposed as a novel approach, apart from this subsequent protection algorithm also developed to build efficient secured BYOD environment. Finally, the research outcome contributes to building a Cyber-defense BYOD environment and cyber forensic BYOD ecosystem to protect the critical infrastructure of the organization adopting the BYOD services.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call