語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Mobile Security: A Systems Engineeri...
~
Zahadat, Nima.
FindBook
Google Book
Amazon
博客來
Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security Through the Combination of Policy Management and Technology.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security Through the Combination of Policy Management and Technology./
作者:
Zahadat, Nima.
面頁冊數:
219 p.
附註:
Source: Dissertation Abstracts International, Volume: 77-07(E), Section: B.
Contained By:
Dissertation Abstracts International77-07B(E).
標題:
Systems science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10024089
ISBN:
9781339516745
Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security Through the Combination of Policy Management and Technology.
Zahadat, Nima.
Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security Through the Combination of Policy Management and Technology.
- 219 p.
Source: Dissertation Abstracts International, Volume: 77-07(E), Section: B.
Thesis (Ph.D.)--The George Washington University, 2016.
With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to use personal mobile devices for their work and make no distinction between using their carriers' services versus their organizations' Wi-Fi. BYOD is an extension of corporate networks and thus it is essential to secure BYODs to protect enterprise networks (Wang & Vangury, 2014).
ISBN: 9781339516745Subjects--Topical Terms:
3168411
Systems science.
Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security Through the Combination of Policy Management and Technology.
LDR
:03172nmm a2200325 4500
001
2072894
005
20160902113909.5
008
170521s2016 ||||||||||||||||| ||eng d
020
$a
9781339516745
035
$a
(MiAaPQ)AAI10024089
035
$a
AAI10024089
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Zahadat, Nima.
$3
3188117
245
1 0
$a
Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security Through the Combination of Policy Management and Technology.
300
$a
219 p.
500
$a
Source: Dissertation Abstracts International, Volume: 77-07(E), Section: B.
500
$a
Adviser: Paul Blessner.
502
$a
Thesis (Ph.D.)--The George Washington University, 2016.
520
$a
With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to use personal mobile devices for their work and make no distinction between using their carriers' services versus their organizations' Wi-Fi. BYOD is an extension of corporate networks and thus it is essential to secure BYODs to protect enterprise networks (Wang & Vangury, 2014).
520
$a
To address the security concerns of BYOD, many vendors have introduced Mobile Device Management (MDM) systems. Such systems by themselves do not and cannot provide comprehensive solutions to BYOD precisely due to the nature of BYOD: the user and not the enterprise owns the device. BYOD necessitates a different paradigm, one in which the device is removed as the primary object of security and one in which the device, the user (employee), and management are all taken into consideration. Further, the approach to security would necessitate technology, policy management, and people integration instead of the traditional technology alone approach.
520
$a
In this dissertation, risks of allowing BYOD balanced by its benefits will be examined. The instrument for addressing BYOD security concerns will be presented as a BYOD Security Framework. The framework has three pillars: People, Policy Management, and Technology. It will be demonstrated that these three pillars are necessary in order to secure BYOD implementations in an enterprise.
520
$a
To validate the framework, an empirical survey was conducted from a pool of 114 industry security practitioners. The resulting dataset was analyzed via nonparametric statistics for ordinal data to determine the association between the level of the BYOD Security Framework elements being de facto implemented in organizations and the frequency of security breaches associated with BYOD in those organizations to identify and confirm key elements of the framework.
590
$a
School code: 0075.
650
4
$a
Systems science.
$3
3168411
650
4
$a
Information technology.
$3
532993
650
4
$a
Information science.
$3
554358
690
$a
0790
690
$a
0489
690
$a
0723
710
2
$a
The George Washington University.
$b
Systems Engineering.
$3
1032058
773
0
$t
Dissertation Abstracts International
$g
77-07B(E).
790
$a
0075
791
$a
Ph.D.
792
$a
2016
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10024089
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9305762
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入