The organization of the paper is as the following: Section 2 cover the background study of BYOD and
APT attack. Section 3 and 4 are the methodology and security policy implementation sections. Section 5
presents the evaluation result and its discussion. Finally, a section on Conclusion is shared.