Transcription of Guidelines for Managing the Security of Mobile Devices in ...
{{id}} {{{paragraph}}}
NIST Special Publication 800-124 Revision 1 Guidelines for Managing the Security of Mobile Devices in the Enterprise Murugiah Souppaya Karen Scarfone This version supersedes C O M P U T E R S E C U R I T Y NIST Special Publication 800-124 Revision 1 Guidelines for Managing the Security of Mobile Devices in the Enterprise Murugiah Souppaya Computer Security Division Information Technology Laboratory Karen Scarfone Scarfone Cybersecurity This version supersedes June 2013 Department of Commerce Cameron F. Kerry, Acting Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director Guidelines FOR Managing THE Security OF Mobile Devices IN THE ENTERPRISE ii Authority This publication has been developed by NIST to further its statutory responsibilities under the Federal Information Security Management Act (FISMA), Public Law ( ) 107-347.
the organization’s facilities and on the organization’s networks). Before designing and deploying mobile device solutions, organizations should develop system threat models. Threat modeling helps organizations to identify security requirements and to design the mobile …
Domain:
Source:
Link to this page:
Please notify us if you found a problem with this document:
{{id}} {{{paragraph}}}
Of Strategic Sourcing on Organization’s, Of strategic sourcing, Organization, Sourcing, Strategic, Strategic Sourcing, Supply Chain Management (SCM): Theory and Evolution, Of Strategic, Supplier Evaluation - The first steps for effective sourcing, Supplier Evaluation – the first steps for effective sourcing, Strategic Planning Processes for Information