Académique Documents
Professionnel Documents
Culture Documents
www.tricksworld.net.tc
INTRODUCTION
Device types and access locations continues to increase,
the ability to manage and control data security has become mandatory An organization best protect sensitive information stored on mobile devices (laptops, notebooks, desktops, PDAs,
Work in todays sophisticated environments, so as a result, they:1. Complicate existing processes within the IT department 2. Create support challenges for the Helpdesk 3. Expose data during routine IT recovery, repair and maintenance 4. Impede end-user acceptance of security technology 5. Cannot meet a number of emerging key data security requirements
Provide separate administrative roles (from help desk to security admin) to control administrator privileges. Deliver detailed mobile end point reporting and auditing information
Authentication of users
Rogue access to data Lost devices Protecting existing security investments
COMMUNICATION ARCHITECTURE
DIGITAL CERIFICATES
1.Identity information, such as the name and the address of the certificate owner
2. Public key 3. Expiry date 4. One or more digital signatures, to prevent modification of the certificate
Conclusion
Security is about minimizing risk, not eliminating it. This means identifying the weakest links in our system and then designing an appropriate solution that takes into account the associated risks and costs to protect the mobile data.