There are several notable security issues in BYOD environment. This is due to the fact that the mobile
devices are lacking in terms of computational power and resources required to enforce security features in
guarding against malware attacks. Direct threat like tampering and lost or theft of portable mobile devices
are also becoming an issue in BYOD environment. Other indirect threats like interception of
communication in BYOD environment is also another troublesome matter. Communication interception is
often resulted from unprotected and unregulated transmission of corporate data involving insecure cloudbased
services. Apart from that, employees are contributing factors in the occurrence of security issues
within BYOD environment. The lack of security awareness amongst the employees has led to extensive
abuse of organization data [2]. APT is a systematic and complex attack used by coordinated and highly
skilled perpetrators to compromise machines and network over a prolonged time span in stealthy manner
[3,14]. APT is first coined in US Air Force circa 2006 as it originally referred to nation-states stealing of
data and defaming others for strategic gain [4]. APT exfiltrates data like customer records, source code,
sensitive and confidential information to be stolen and leaked for sabotaging purposes. There are several
key features of APT: