Show simple item record

dc.contributor.authorFranklin, Joshua M.
dc.contributor.authorHowell, Gema
dc.contributor.authorBoeckl, Kaitlin
dc.contributor.authorLefkovitz, Naomi
dc.contributor.authorNadeau, Ellen
dc.contributor.authorShariati, Dr. Behnam
dc.contributor.authorAjmo, Jason G.
dc.contributor.authorBrown, Christopher J.
dc.contributor.authorDog, Spike E.
dc.contributor.authorJavar, Frank
dc.contributor.authorPeck, Michael
dc.contributor.authorSandlin, Kenneth F.
dc.date.accessioned2019-10-09T14:46:40Z
dc.date.available2019-10-09T14:46:40Z
dc.date.issued2019-07
dc.description.abstractMobile devices provide access to workplace data and resources that are vital for organizations to accomplish their mission while providing employees the flexibility to perform their daily activities. Securing these devices is essential to the continuity of business operations. While mobile devices can increase organizations’ efficiency and employee productivity, they can also leave sensitive data vulnerable. Addressing such vulnerabilities requires mobile device management tools to help secure access to the network and resources. These tools are different from those required to secure the typical computer workstation. To address the challenge of securing mobile devices while managing risks, the NCCoE at NIST built a reference architecture to show how various mobile security technologies can be integrated within an enterprise’s network. This NIST Cybersecurity Practice Guide demonstrates how organizations can use standards-based, commercially available products to help meet their mobile device security and privacy needs.en_US
dc.description.urihttps://csrc.nist.gov/publications/detail/sp/1800-21/draften_US
dc.format.extent4 filesen_US
dc.genrereports preprintsen_US
dc.identifierdoi:10.13016/m2bacy-xhvc
dc.identifier.urihttp://hdl.handle.net/11603/14996
dc.language.isoen_USen_US
dc.publisherNISTen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofseriesNIST SPECIAL PUBLICATION;1800-21
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rightsPublic Domain Mark 1.0*
dc.rightsThis is a work of the United States Government. In accordance with 17 U.S.C. 105, no copyright protection is available for such works under U.S. Law."
dc.rights.urihttp://creativecommons.org/publicdomain/mark/1.0/*
dc.subjectBring your own deviceen_US
dc.subjectBYODen_US
dc.subjectcorporate-owned personally-enableden_US
dc.subjectCOPEen_US
dc.subjectmobile device managementen_US
dc.subjectmobile device securityen_US
dc.subjecton-premiseen_US
dc.titleMobile Device Security Corporate-Owned Personally-Enabled (COPE)en_US
dc.typeTexten_US


Files in this item

Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
Except where otherwise noted, this item's license is described as This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.