Towards a novel boyd vulnerability metrics taxonomy for organisations

Research output: Chapter in Book/Report/Conference proceedingConference contribution


Bringing your own device (BYOD) affect various parts of people’s life, being education, social or economy. With its many benefits as well as weaknesses (Risk, threat and Vulnerabilities), an awareness of the level of this weaknesses is very crucial, therefore a systematic technique is needed to measure it security. Vulnerability evaluation is an important phase in safeguarding a BYOD environment as this assist security managers in deciding on the best security measures to fight against attacks. In this paper we aim to express a taxonomy of BYOD security metrics approach from the perspective of an organisation target type (physical and personnel security). The security of a BYOD environment is influence dynamically by a number of considerations such as the discovering of new and historic vulnerabilities and threats, policy and algorithm structures (access control rule) and metrics. This metrics can be express quantitatively to offer security assurance which makes organisational security engineering decisions easier. Using the security metrics as a form of measurement that permits evaluation under the appropriate security considerations and addressing vulnerability challenging’s in a BYOD environment. Hence a quantitatively scored can be created on probability models. We start the quantitative scoring by expressing an outline taxonomy of feasible BYOD security metrics structure from organisational (device) and technical details.

Original languageEnglish
Title of host publicationProceedings of the International Conferences on WWW/Internet 2018 and Applied Computing 2018
EditorsHans Weghorn, Pedro Isaias, Luis Rodrigues
PublisherIADIS Press
Number of pages5
ISBN (Electronic)9789898533821
Publication statusPublished - 23 Oct 2018
EventInternational Conferences on WWW/Internet, ICWI 2018 and Applied Computing 2018 - Budapest, Hungary
Duration: 21 Oct 201823 Oct 2018


ConferenceInternational Conferences on WWW/Internet, ICWI 2018 and Applied Computing 2018


  • Byod Metrics
  • Security Requirement
  • Taxonomy
  • Vulnerability


Dive into the research topics of 'Towards a novel boyd vulnerability metrics taxonomy for organisations'. Together they form a unique fingerprint.

Cite this