Insider Threats+Disruptive Smart Phone Technology = New Challenges to Corporate Security
Wireless portable computing technology is proving itself as the ultimate disruptive technology to enterprises and new threats have already been a concern for media and industry. Unlike most available advisories and public guidelines, the focus of this study is on the intersection of two aspects of t...
Saved in:
Main Authors: | , , |
---|---|
Format: | |
Published: |
2018
|
Online Access: | http://dspace.uniten.edu.my/jspui/handle/123456789/8699 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-8699 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-86992018-02-20T03:50:39Z Insider Threats+Disruptive Smart Phone Technology = New Challenges to Corporate Security Al-Haiqi, A. Jumari, K. Ismail, M. Wireless portable computing technology is proving itself as the ultimate disruptive technology to enterprises and new threats have already been a concern for media and industry. Unlike most available advisories and public guidelines, the focus of this study is on the intersection of two aspects of these new challenges; the indispensable smart phones in the hands of malicious insiders to the corporate. Many new threats could be less than obvious with the combination of these two aspects. Researchers provide a general classification for these threats, present some challenging scenarios and finally discuss the solutions that already had been considered or could be taken into consideration to eliminate or mitigate the new threats. © Medwell Journals, 2013. 2018-02-20T03:50:39Z 2018-02-20T03:50:39Z 2013 http://dspace.uniten.edu.my/jspui/handle/123456789/8699 |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
description |
Wireless portable computing technology is proving itself as the ultimate disruptive technology to enterprises and new threats have already been a concern for media and industry. Unlike most available advisories and public guidelines, the focus of this study is on the intersection of two aspects of these new challenges; the indispensable smart phones in the hands of malicious insiders to the corporate. Many new threats could be less than obvious with the combination of these two aspects. Researchers provide a general classification for these threats, present some challenging scenarios and finally discuss the solutions that already had been considered or could be taken into consideration to eliminate or mitigate the new threats. © Medwell Journals, 2013. |
format |
|
author |
Al-Haiqi, A. Jumari, K. Ismail, M. |
spellingShingle |
Al-Haiqi, A. Jumari, K. Ismail, M. Insider Threats+Disruptive Smart Phone Technology = New Challenges to Corporate Security |
author_facet |
Al-Haiqi, A. Jumari, K. Ismail, M. |
author_sort |
Al-Haiqi, A. |
title |
Insider Threats+Disruptive Smart Phone Technology = New Challenges to Corporate Security |
title_short |
Insider Threats+Disruptive Smart Phone Technology = New Challenges to Corporate Security |
title_full |
Insider Threats+Disruptive Smart Phone Technology = New Challenges to Corporate Security |
title_fullStr |
Insider Threats+Disruptive Smart Phone Technology = New Challenges to Corporate Security |
title_full_unstemmed |
Insider Threats+Disruptive Smart Phone Technology = New Challenges to Corporate Security |
title_sort |
insider threats+disruptive smart phone technology = new challenges to corporate security |
publishDate |
2018 |
url |
http://dspace.uniten.edu.my/jspui/handle/123456789/8699 |
_version_ |
1644494510140424192 |
score |
13.160551 |