000 03159cam  2200421zi 4500
0019.910859
003CaOODSP
00520221107182226
006m     o  d f      
007cr cn|||||||||
008220504e20220428onc     ob   f000 0 eng d
020 |a9780660433929
040 |aCaOODSP|beng|erda|cCaOODSP
043 |an-cn---
0861 |aD97-4/70-003-2022E-PDF
24500|aEnd user device security for bring-your-own-device (BYOD) deployment models.
264 1|a[Ottawa] : |bCommunications Security Establishment = Centre de la sécurité des telecommunications, |cApril 28, 2022.
300 |a1 online resource (21 pages).
336 |atext|btxt|2rdacontent
337 |acomputer|bc|2rdamedia
338 |aonline resource|bcr|2rdacarrier
4901 |aManagement ; |vITSM.70.003
500 |aCover title.
500 |aIssued also in HTML format.
500 |a"Unclassified / Non classifié."
500 |a"Canadian Centre for Cyber Security."
500 |aIssued also in French under title: Sécurité des appareils des utilisateurs finaux pour les modèles de déploiement prenez vos appareils personnels (PAP).
504 |aIncludes bibliographical references (page 21).
520 |a"This document introduces potentially vulnerable attack surfaces associated with end user devices that are used as part of bring-your-own-device (BYOD) deployment models in organizations of all sizes. This document also provides mitigation techniques that your organization can apply to reduce the risks if it chooses to implement a BYOD model. Poorly configured end user devices can put your organization at risk. They are entry points through which threat actors can gain unauthorized access to sensitive data. End users may not have the technical expertise to avoid potential security incidents and rely on technical controls and policies that are inherent to the devices to keep them and their data secure. If your organization chooses to use a BYOD deployment model, you must be aware that end users can unknowingly introduce additional risk to your environment. Many of the organizational policy controls are soft limitations as opposed to hard restrictions due to the legalities of ownership and, due to the design of the systems supporting them, technical controls are limited on the device side"--Overview, page 3.
650 0|aPortable computers|xSecurity measures|zCanada.
650 0|aSmartphones|xSecurity measures|zCanada.
650 0|aComputer security|zCanada.
7102 |aCanadian Centre for Cyber Security, |eissuing body.
77508|tSécurité des appareils des utilisateurs finaux pour les modèles de déploiement prenez vos appareils personnels (PAP).|w(CaOODSP)9.910860
830#0|aManagement series, information technology security guidance (Communications Security Establishment (Canada))|vITSM.70.003.|w(CaOODSP)9.842856
85640|qPDF|s583 KB|uhttps://publications.gc.ca/collections/collection_2022/cstc-csec/D97-4-70-003-2022-eng.pdf
8564 |qHTML|sN/A|uhttps://cyber.gc.ca/en/guidance/end-user-device-security-bring-your-own-device-byod-deployment-models-itsm70003