DocumentCode
2460143
Title
Securing Enterprise Mobile Information
Author
Copeland, Wes ; Chiang, Chia-Chu
Author_Institution
Dept. of Comput. Sci., Univ. of Arkansas at Little Rock, Little Rock, AR, USA
fYear
2012
fDate
4-6 June 2012
Firstpage
80
Lastpage
83
Abstract
Advanced technologies used on mobile devices has brought us to the attention of mobile information security. This paper deals with the mobile phone information security of enterprises. The paper begins with the definition of information security, types of threats and vulnerabilities, and impacts of security breaches. An enterprise mobile information security management environment is presented to ensure the information security on mobile devices. The implementation of the system is described. The system does not guarantee the information security with a security policy in it. A set of guidelines for the operation of organization´s mobile devices can be used to protect network data against unsafe practices. The guidelines given by the National Institute of Standards and Technology (NIST) provide rules of safeguards for the mobile devices.
Keywords
mobile computing; mobile handsets; telecommunication network management; telecommunication security; NIST guidelines; National Institute of Standards and Technology; advanced technology; enterprise mobile information security management environment; mobile phone information security; network data protection; organization mobile devices; securing enterprise mobile information; security breaches; security policy; unsafe practices; Information security; Mobile communication; Mobile handsets; Organizations; Standards organizations; Virtual private networks; AUP; VPN; information security; threat; vulnerability;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer, Consumer and Control (IS3C), 2012 International Symposium on
Conference_Location
Taichung
Print_ISBN
978-1-4673-0767-3
Type
conf
DOI
10.1109/IS3C.2012.30
Filename
6228253
Link To Document