000
| 03159nam 2200421zi 4500 |
---|
001 | 9.910859 |
---|
003 | CaOODSP |
---|
005 | 20221107182226 |
---|
006 | m o d f |
---|
007 | cr cn||||||||| |
---|
008 | 220504e20220428onc ob f000 0 eng d |
---|
020 | |a9780660433929 |
---|
040 | |aCaOODSP|beng|erda|cCaOODSP |
---|
043 | |an-cn--- |
---|
086 | 1 |aD97-4/70-003-2022E-PDF |
---|
245 | 00|aEnd user device security for bring-your-own-device (BYOD) deployment models. |
---|
264 | 1|a[Ottawa] : |bCommunications Security Establishment = Centre de la sécurité des telecommunications, |cApril 28, 2022. |
---|
300 | |a1 online resource (21 pages). |
---|
336 | |atext|btxt|2rdacontent |
---|
337 | |acomputer|bc|2rdamedia |
---|
338 | |aonline resource|bcr|2rdacarrier |
---|
490 | 1 |aManagement ; |vITSM.70.003 |
---|
500 | |aCover title. |
---|
500 | |aIssued also in HTML format. |
---|
500 | |a"Unclassified / Non classifié." |
---|
500 | |a"Canadian Centre for Cyber Security." |
---|
500 | |aIssued also in French under title: Sécurité des appareils des utilisateurs finaux pour les modèles de déploiement prenez vos appareils personnels (PAP). |
---|
504 | |aIncludes bibliographical references (page 21). |
---|
520 | |a"This document introduces potentially vulnerable attack surfaces associated with end user devices that are used as part of bring-your-own-device (BYOD) deployment models in organizations of all sizes. This document also provides mitigation techniques that your organization can apply to reduce the risks if it chooses to implement a BYOD model. Poorly configured end user devices can put your organization at risk. They are entry points through which threat actors can gain unauthorized access to sensitive data. End users may not have the technical expertise to avoid potential security incidents and rely on technical controls and policies that are inherent to the devices to keep them and their data secure. If your organization chooses to use a BYOD deployment model, you must be aware that end users can unknowingly introduce additional risk to your environment. Many of the organizational policy controls are soft limitations as opposed to hard restrictions due to the legalities of ownership and, due to the design of the systems supporting them, technical controls are limited on the device side"--Overview, page 3. |
---|
650 | 0|aPortable computers|xSecurity measures|zCanada. |
---|
650 | 0|aSmartphones|xSecurity measures|zCanada. |
---|
650 | 0|aComputer security|zCanada. |
---|
710 | 2 |aCanadian Centre for Cyber Security, |eissuing body. |
---|
775 | 08|tSécurité des appareils des utilisateurs finaux pour les modèles de déploiement prenez vos appareils personnels (PAP).|w(CaOODSP)9.910860 |
---|
830 | #0|aManagement series, information technology security guidance (Communications Security Establishment (Canada))|vITSM.70.003.|w(CaOODSP)9.842856 |
---|
856 | 40|qPDF|s583 KB|uhttps://publications.gc.ca/collections/collection_2022/cstc-csec/D97-4-70-003-2022-eng.pdf |
---|
856 | 4 |qHTML|sN/A|uhttps://cyber.gc.ca/en/guidance/end-user-device-security-bring-your-own-device-byod-deployment-models-itsm70003 |
---|