scholarly journals PEMILIHAN SOLUSI PENERAPAN BRING YOUR OWN DEVICE (BYOD) BERDASARKAN KONTROL KEAMANANNYA

2019 ◽  
Vol 21 (3) ◽  
pp. 214-222
Author(s):  
Moh. Idris

Abstract :  The term BYOD (Bring Your Own Device) refers to the use of employees' personal devices (for example smartphones, tablets, laptops, netbooks) to do their work and manage corporate data from anywhere at any time. BYOD has been widely applied in the business world, hospitals, and education. With the ease that can be achieved by using BYOD, the security aspect is very important to consider. It starts with the security of the device to the security of company data that can be accessed by employees. Five dimensions of security control that must be considered in implementing BYOD: 1) data control; 2) access control; 3) network access control; 4) device management; 5) create a supporting framework. With the five BYOD implementation solutions presented in this study, there is only one solution that accommodates the five dimensions of BYOD security control, the use of Mobile Device Management (MDM) technology.

2014 ◽  
Vol 940 ◽  
pp. 465-468
Author(s):  
Yu Wang ◽  
Yu Duan

This research proposes network access control model based on the trusted label. The model combines the admission access control of network device and the transmission access control of data flow effective, and uses the trusted computing technology to ensure the credibility of the generated label, and adopts the access control based on the security domain to locate the granularity of access control to every packets, reduces the probability of successful attack to the network based on the information flow, thereby improving the security control of the network.


Sign in / Sign up

Export Citation Format

Share Document