A Study on Mobile Device Control Model for Critical Data Leakage Prevention in the Enterprise Business Service

2015 
As information technology environment gets based on mobile, cloud, BYOD, mobile terminal just used for communication in the past is changed to support e-commerce and mobile office using the internet. However, threat of tap and information leak due to terminal loss, theft or infection of malware occurs. Corporations are strengthening access control and security through attaching sticker to a smart phone camera but it looks not enough as fundamental protection measures. In order to maintain high level of security, security control function should be applied and location-based entrants’ security policy should be established so that a method to control mobile device can be directly suggested.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    8
    References
    0
    Citations
    NaN
    KQI
    []