This document discusses security attacks on the Bring Your Own Device (BYOD) model. It begins with an abstract that introduces BYOD and its advantages for businesses but also the security risks it poses due to limitations of devices and emerging attacks. The document then provides a taxonomy of potential BYOD attacks and discusses advanced persistent threats and malware attacks in depth. It proposes solutions to mitigate BYOD attacks and evaluates the solutions based on the X.800 security architecture standard.