원문정보
초록
영어
As information technology environment gets based on mobile, cloud, BYOD, mobile terminal just used for communication in the past is changed to support e-commerce and mobile office using the internet. However, threat of tap and information leak due to terminal loss, theft or infection of malware occurs. Corporations are strengthening access control and security through attaching sticker to a smart phone camera but it looks not enough as fundamental protection measures. In order to maintain high level of security, security control function should be applied and location-based entrants’ security policy should be established so that a method to control mobile device can be directly suggested.
목차
1. Introduction
2. Prevent Information Leakage
3. Facility and Access Security
4. Security Threat and Vulnerability of Mobile Terminal
4.1 Threat of Portability of Mobile Terminal
4.2 Threat of Contents of Mobile Terminal
4.3 Threat of Openness of Mobile Environment
4.4 Vulnerability of Low Performance of Mobile Terminal
5. Model for Security Control Policy of Mobile Terminal
5.1 Strengthen Security Function Control of Mobile Terminal
5.2 Recognition of a Mobile Terminal Using A Positioning Service
5.3 Apply Role-Based Access Control Model
5.4 Apply Mobile Terminal Security Policy Based on Risk Appraisal
6. Embody Security Control of Mobile Terminal
7. Conclusion
References