2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet353/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   349   350   351   352   353   354   355   356   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Data Ownership
When a personal device is used for business tasks, commingling of personal data and business 
data is likely to occur. Some devices can support storage segmentation, but not all devices can 
provide data-type isolation. Establishing data ownership can be complicated. For example, if 
a device is lost or stolen, the company may wish to trigger a remote wipe, clearing the device 
of all valuable information. However, the employee will often be resistant to this, especially 
if there is any hope that the device will be found or returned. A wipe may remove all business 
and personal data, which may be a significant loss to the individual—especially if the device 
is recovered, because then the wipe would seem to have been an overreaction. Clear policies 
about data ownership should be established. Some MDM solutions can provide data isola-
tion/segmentation and support business data sanitization without affecting personal data.
The mobile device policy regarding data ownership should address backups for mobile 
devices. Business data and personal data should be protected by a backup solution—either 
a single solution for all data on the device or separate solutions for each type or class of 
data. This reduces the risk of data loss in the event of a remote-wipe event as well as device 
failure or damage.
Support Ownership
When an employee’s mobile device experiences a failure, a fault, or damage, who is respon-
sible for the device’s repair, replacement, or technical support? The mobile device policy 
should define what support will be provided by the company and what support is left to the 
individual and, if relevant, their service provider.
Patch Management
The mobile device policy should define the means and mechanisms of patch management 
for a personally owned mobile device. Is the user responsible for installing updates? Should 
the user install all available updates? Should the organization test updates prior to on-
device installation? Are updates to be handled over the air (via service provider) or over 
Wi-Fi? Are there versions of the mobile OS that cannot be used? What patch or update level 
is required?



Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   349   350   351   352   353   354   355   356   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish