This site uses cookies. By continuing to use this site you agree to our use of cookies. To find out more, see our Privacy and Cookies policy.
Paper The following article is Open access

Information security management of enterprise mobile device

, , , and

Published under licence by IOP Publishing Ltd
, , Citation T A Omelchenko et al 2020 J. Phys.: Conf. Ser. 1661 012008 DOI 10.1088/1742-6596/1661/1/012008

1742-6596/1661/1/012008

Abstract

The development of the modern labour market involves increasing the level of mobility of personnel, so the current trend is the spread of mobile devices in the implementation of professional activities. This practice improves the efficiency of enterprise, but also has a negative impact on the security of information systems of enterprises. The growing requirements of employers have led to the growth of the functionality of mobile devices. However, this also causes an increase in the number of vulnerabilities in them, leading to an increase in the complexity of the security processes. The combination of the above problems determines the need to organize the process of information security management of enterprise mobile devices. The model of information security management of enterprise mobile devices is described in the article. It allows identifying vulnerabilities of operating system objects of enterprise mobile devices by modelling combinations of dangerous permissions more accurately.

Export citation and abstract BibTeX RIS

Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.

Please wait… references are loading.
10.1088/1742-6596/1661/1/012008