Monday, January 23, 2017

Security of Cloud Data and BYOD Programs

Abstract\n rifle days brought us a couple of(prenominal) interesting IT solutions associated with small and core size business. Deeper look in them let us advert that engineering connected with entropy stored with usage of overcast technology and the politic of using hold computers of employees at work called receive Your Own imposture(BYOD) are acquire the most popular. In this hold we go forth kick in your watchfulness to aspects of credentials associated with those two technologies and created on connection of them.\n\nKeywords\ncloud computing, bring your own device, security, privacy, security form _or_ system of government\n\n1. Introduction\nPast years have brought us approximately interesting IT solutions for companies. Getting present with them allows us to focus on technologies related to Cloud Storage, and polity to use private devices at work, called Bring Your Own Device (BYOD). It is worth noting the risks associated with each of these solutions indiv idually, as well as at the points where they combine.\n\n2. Standards\nIn 2012, KPMG, the consulting and audit gild conducted a survey betwixt Cloud Computing do providers. It concerned the biggest challenges in the instruction execution of cloud technology.\nIn 2014, subcommittee SC 27, responsible for the preparation of guidelines to warrantee data security, began working on run acrosss related to the Code of blueprint for information security controls for cloud computing operates establish on ISO/IEC 27002 (ISO 27017) and the Code of do for PII protection in usual cloud acting as PII processors (ISO 27018).\nThe first of these standards is currently in the initial deliver of development. The project is to be completed in the second half of 2015. It will acknowledge information on the practical management of security in cloud computing, establish on the recomm completeations that are in ISO 27002. Standard will include guidance for both clients and service providers.\n The ISO 27018 is in final stage of development, and its publication is scheduled for the end ...

No comments:

Post a Comment