Abstract

The usage of Internet of Things (IoT)/ Bring Your Own Devices (BYOD) has grown up exponentially, as expected 50 Billion IoT devices will get connected by the end of 2020 in the world in smart city environment. Advancement of Human Driven Edge Computing (HEC) with 5th Generation Internet services also makes this more feasible. Use of IoT and increased demand of BYOD becomes one of the fundamental needs to increase the organization employee productivity and business agility. But it increased the significant risk of the cyber-attack which is leading a major reason for business disruption and becomes a leading question about how to get a cyber secured citizenship in the smart city environment as well as in the organization where BYOD is used in large numbers. In order to conduct forensic investigation post incident detection of malicious activities from IoT/BYOD end point is most challenging task. A strategic practical approach in this research is presented to detect malicious activities so that organization can adopt to protect the critical infrastructure and smart city critical infrastructure. In order to achieve the goal of detecting of malicious activities in BYOD environment, simulation performed in 3 phases. The 1st phase of the simulation performed while BYOD endpoint was outside the organization over the internet without VPN. The 2nd phase of the simulation was performed where BYOD endpoint was securely onboarded using a corporate wireless network with a secured onboarding process. The 3rd phase of the test done where IoT/BYOD was outside the organization with a VPN. A unique robust scalable model puts forward with significant result from this research and concluded for creating a cyber forensic ecosystem in IoT/BYOD environment to enable cyber secured citizenship in era of HEC with 5G and IoT.

Highlights

  • The world hits 3rd Major global risk [1] as defined in the Global Risk Report of World Economic Forum’2019 due to COVID-19 pandemic outbreaks on 11th March’20 by World Health Organization [2]

  • We present a practical approach of detecting malicious activities in the Bring Your Own Devices (BYOD) environment in order to develop and advancement of cyber forensic ecosystem so that challenging phase in forensic can be tackled seamlessly

  • 1) ARCHITECTURE BYOD DESIGN OVER INTERNET WITH VPN During this study, we have focused on the Business Continuity Plan for the organization due to COVID-19 pandemic lockdown and how organization Critical infrastructure requirements got changed suddenly and BYOD becomes more important for the organization

Read more

Summary

Introduction

The world hits 3rd Major global risk [1] as defined in the Global Risk Report of World Economic Forum’2019 due to COVID-19 pandemic outbreaks on 11th March’ by World Health Organization [2]. The entire world is in locked downstage while various government has declared locked down in regional country [3] to break the chain of Covid to reduce the impact of pandemic damage. This pandemic has changed the complete business ecosystem and the enterprise working model turned into an alternate method of working from the home environment using BYOD. Top 3rd major global risk [4] emerged due to Covid-19 WFH (Work from home) alternate method of the working environment and the cyber threat becomes business disruption reason.

Objectives
Methods
Findings
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call