This report presents security policies that can be deployed to mitigate risks that are related with the trend of Consumerization of IT (COIT) and Bring Your Own Device (BYOD). The aim of this document is to identify mitigation strategies, policies and controls for the risks identified in this area.

Consumerization of IT: Risk Mitigation Strategies and Good Practices. Responding to the Emerging Threat Environment / Jim, Clarke; Marcos Gomez, Hidalgo; Lioy, Antonio; Louis, Marinos; Milan, Petkovic; Claire, Vishik; Jeremy, Ward. - ELETTRONICO. - ENISA deliverable 2011-10-18:(2011).

Consumerization of IT: Risk Mitigation Strategies and Good Practices. Responding to the Emerging Threat Environment.

LIOY, ANTONIO;
2011

Abstract

This report presents security policies that can be deployed to mitigate risks that are related with the trend of Consumerization of IT (COIT) and Bring Your Own Device (BYOD). The aim of this document is to identify mitigation strategies, policies and controls for the risks identified in this area.
2011
File in questo prodotto:
File Dimensione Formato  
COITMitigationStategiesPublishedVersion.pdf

accesso aperto

Tipologia: 2. Post-print / Author's Accepted Manuscript
Licenza: PUBBLICO - Tutti i diritti riservati
Dimensione 1.07 MB
Formato Adobe PDF
1.07 MB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2592005
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo