A Study on Mobile Device Control Model for Critical Data Leakage Prevention in the Enterprise Business Service

Yong-Suk Kang, Yoondeok Kim, Yongtae Shin, Jong-Bae Kim
2015 International Journal of Security and Its Applications  
As information technology environment gets based on mobile, cloud, BYOD, mobile terminal just used for communication in the past is changed to support e-commerce and mobile office using the internet. However, threat of tap and information leak due to terminal loss, theft or infection of malware occurs. Corporations are strengthening access control and security through attaching sticker to a smart phone camera but it looks not enough as fundamental protection measures. In order to maintain high
more » ... evel of security, security control function should be applied and location-based entrants' security policy should be established so that a method to control mobile device can be directly suggested.
doi:10.14257/ijsia.2015.9.10.34 fatcat:og4tvc6ybnfchbr6xbpafk3xza