DOC PREVIEW
NU MSIT 458 - Mobile Device Security

This preview shows page 1-2 out of 5 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Slide 1BackgroundProblem StatementSecurity Threat: ConfidentialitySecurity Threat: AvailabilityMobile Device SecurityGroup Magic:Michael GongJake KreiderChris LugoKwame OsafohMSIT 458 – Information SecurityOctober 30, 2010BackgroundMobility continues to become an increasingly vital component of our everyday livesPrevalence of 3G/4G cellular services enable being connected at all times to the corporate and social networksEmployers continue to seek new ways to capitalize on being connected with their employeesEmployees want a simple but feature rich platformEmployees want the freedom and simplicity to use a device of their choosingMobile interaction between user and company systems must be seamlessMobility without compromising securityProblem StatementWith the explosive growth of smartphones, tablets and mobile devices, companies must find a means of providing access to their internal systems and information to their mobile workforce securely and seamlessly.Security Threat: ConfidentialityProper device accessDevice theft/lossData loss / information leakageOwnership rightsEnd-user right to privacyStruggle with information accessibilitySecurity Threat: AvailabilityAlways-on accessibilityDisparate technologies / carrier agreementsMalware/virus detection & preventionHigh availability / resiliency across platformsAdherence to company-wide information security


View Full Document

NU MSIT 458 - Mobile Device Security

Documents in this Course
Snort

Snort

25 pages

Hacked

Hacked

23 pages

Hacked

Hacked

6 pages

Firewalls

Firewalls

52 pages

Load more
Download Mobile Device Security
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Mobile Device Security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Mobile Device Security 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?