Sunday, January 8, 2017
Security of Cloud Data and BYOD Programs
victimize\nLast years brought us few interesting IT solutions associated with diminutive and middle size business. Deeper boldness in them let us see that technology connected with data stored with usage of grease ones palms technology and the politic of victimization own computers of employees at unravel called Bring Your sustain Device(BYOD) be getting the most popular. In this article we willing put to work your attention to aspects of surety measures associated with those deuce technologies and created on connection of them.\n\nKeywords\n bribe computing, bring your own device, security, privacy, security policy\n\n1. Introduction\n late(prenominal) years have brought us some interesting IT solutions for companies. acquiring acquainted with them allows us to condense on technologies related to grease ones palms Storage, and policy to use toffee-nosed devices at work, called Bring Your Own Device (BYOD). It is worth noting the risks associated with from each one of these solutions individually, as well as at the points where they combine.\n\n2. Standards\nIn 2012, KPMG, the consulting and canvas company conducted a scene between Cloud deliberation service providers. It concerned the biggest challenges in the implementation of debauch technology.\nIn 2014, subcommittee SC 27, responsible for the facility of guidelines to guarantee data security, began workings on projects related to the mandate of practice for selective information security controls for cloud computing serve based on ISO/IEC 27002 (ISO 27017) and the polity of practice for PII protection in public cloud playing as PII processors (ISO 27018).\nThe first of these standards is presently in the initial power point of development. The project is to be faultless in the second fractional of 2015. It will include information on the practical commission of security in cloud computing, based on the recommendations that ar in ISO 27002. Standard will include guidance for some(prenominal) clients and service providers.\nThe ISO 27018 is in last stage of development, and its publication is plan for the end ...
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.