...
首页> 外文期刊>COM-SAC >Considerations in Securing and Controlling Mobile Computing and Devices
【24h】

Considerations in Securing and Controlling Mobile Computing and Devices

机译:保护和控制移动计算和设备的注意事项

获取原文
获取原文并翻译 | 示例
           

摘要

A new phenomenon is quite evident in today's business environment: computing mobility and dispersion. This is evidenced by the number of professionals and employees that carry portable laptops and PDAs, and who seek access to their company's computing resources via public kiosks at airports and cafes, hotels, bookstores and public libraries. It is clear that this trend is not going to decrease but rather blossom. As has been the case in the past, users are not going to give up the convenience of the new technologies for the sake of security. This is simply a matter of progress following its course. ClOs, managers and other profess-sionals need to look into ways to minimize the exposure derived from mobile computing. This COM-SAC issue focuses on the implications of computing mobility, the ambulant worker, the host of threats that this new business model presents to organizations of all types and the need to minimize exposure derived from this new computing environment.
机译:在当今的业务环境中,一种新现象非常明显:计算移动性和分散性。携带便携式笔记本电脑和PDA并通过机场,咖啡厅,酒店,书店和公共图书馆的公共信息亭寻求访问公司计算资源的专业人员和员工的数量便证明了这一点。显然,这种趋势不会减少,而是会开花。与过去一样,用户不会为了安全而放弃新技术的便利性。这只是遵循其进度的问题。 ClO,经理和其他专业人士需要研究将移动计算带来的风险降至最低的方法。此COM-SAC问题集中在计算移动性,急需的工作人员,此新业务模型给所有类型的组织带来的大量威胁以及最大限度地减少这种新计算环境带来的风险的需求方面。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号