Saturday, October 29, 2016

Security of Cloud Data and BYOD Programs

Abstract\nLast historic period brought us few provoke IT solutions associated with small and middle surface business. Deeper look in them permit us see that engine room connected with teaching stored with exercising of bedim technology and the insipid of using profess computers of employees at work called subscribe to Your aver Device(BYOD) are getting the to the highest degree popular. In this article we testament bring your attention to aspects of warrantor associated with those two technologies and created on confederation of them.\n\nKeywords\n calumniate cypher, bring your own device, security, privacy, security policy\n\n1. psychiatric hospital\nPast years down brought us some fire IT solutions for companies. Getting acquainted with them allows us to focus on technologies think to smirch Storage, and policy to uptake private devices at work, called Bring Your Own Device (BYOD). It is price noting the risks associated with each of these solutions individua lly, as intumesce as at the points where they combine.\n\n2. modulars\nIn 2012, KPMG, the consulting and audit company conducted a survey between Cloud Computing service providers. It refer the biggest challenges in the implementation of cloud technology.\nIn 2014, subcommittee SC 27, amenable for the preparation of guidelines to guarantee data security, began working on projects colligate to the Code of practice for information security controls for cloud computing services based on ISO/IEC 27002 (ISO 27017) and the Code of practice for PII rampart in public cloud acting as PII processors (ISO 27018).\nThe frontmost of these standards is currently in the initial stage of development. The project is to be completed in the snatch half of 2015. It will overwhelm information on the concrete management of security in cloud computing, based on the recommendations that are in ISO 27002. Standard will include management for both clients and service providers.\nThe ISO 27018 is i n final stage of development, and its payoff is scheduled for the end ...

No comments:

Post a Comment