首页> 外文期刊>International Journal of Electronic Business >Bring your own device: a survey of threats and security management models
【24h】

Bring your own device: a survey of threats and security management models

机译:带上自己的设备:威胁和安全管理模型概览

获取原文
获取原文并翻译 | 示例
       

摘要

Bring your own device (BYOD) is used for the benefits offered by allowing the use of mobile devices to perform business tasks, but the following questions should be analysed if any organisation want to adopt a BYOD environment: What threats do currently face mobile devices that are being used in BYOD environments? What are the characteristics of the security models proposed until now in order to manage BYOD? Are there integral security models with the minimum requirements in order to take full advantage of BYOD? What are the basic controls that should be taken into account for designing security policies in a business with a BYOD environment? What are the main differences between security on BYOD environments vs. security on corporate owned mobile device environments, regarding how easy is to meet security needs? By giving answers to these questions, we will be able to have a clear vision of what it takes to adopt BYOD in an organisation.
机译:携带自己的设备(BYOD)可带来允许使用移动设备执行业务任务所带来的好处,但是,如果任何组织希望采用BYOD环境,则应分析以下问题:当前,哪些移动设备面临着哪些威胁?在BYOD环境中使用?到目前为止,为了管理BYOD提出的安全模型的特征是什么?是否有最低要求的集成安全模型才能充分利用BYOD?在具有BYOD环境的企业中设计安全策略时应考虑哪些基本控制措施?在满足安全需求的难易程度方面,BYOD环境的安全性与公司拥有的移动设备环境的安全性之间的主要区别是什么?通过回答这些问题,我们将对组织中采用BYOD所要采取的措施有清晰的认识。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号