This report presents security policies that can be deployed to mitigate risks that are related with the trend of Consumerization of IT (COIT) and Bring Your Own Device (BYOD). The aim of this document is to identify mitigation strategies, policies and controls for the risks identified in this area.
Consumerization of IT: Risk Mitigation Strategies and Good Practices. Responding to the Emerging Threat Environment / Jim, Clarke; Marcos Gomez, Hidalgo; Lioy, Antonio; Louis, Marinos; Milan, Petkovic; Claire, Vishik; Jeremy, Ward. - ELETTRONICO. - ENISA deliverable 2011-10-18:(2011).
Consumerization of IT: Risk Mitigation Strategies and Good Practices. Responding to the Emerging Threat Environment.
LIOY, ANTONIO;
2011
Abstract
This report presents security policies that can be deployed to mitigate risks that are related with the trend of Consumerization of IT (COIT) and Bring Your Own Device (BYOD). The aim of this document is to identify mitigation strategies, policies and controls for the risks identified in this area.File | Dimensione | Formato | |
---|---|---|---|
COITMitigationStategiesPublishedVersion.pdf
accesso aperto
Tipologia:
2. Post-print / Author's Accepted Manuscript
Licenza:
PUBBLICO - Tutti i diritti riservati
Dimensione
1.07 MB
Formato
Adobe PDF
|
1.07 MB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2592005
Attenzione
Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo