APT is an intelligent and stealthy threat utilized by a group of highly motivated and resourceful
perpetrators in order to extricate and leak important confidential data from the targeted political or business organizations. APT usually involves prolonged duration of covert monitoring approach in
detecting vulnerabilities within targeted network, in order to infiltrate the network through the
exploitation of the weak points from the vulnerabilities. APT is often hard to detect due to its capability to
bypass traditional security defenses like host firewall, intrusion detection system and other security
systems. There are several challenges with BYOD approaches [14]; 1) distinction of isolation between
privacy of mobile users and work related data; 2) lack of security policies to safeguard BYOD
environment from multiple security attacks; 3) vague definition of access control within mobile devices in
conjunction with BYOD environment and 4) proneness of BYOD mobile devices to insider attacks