期刊文献+

企业信息安全中的手机防泄密解决方案 被引量:4

A Solution for Secret Leakage by Cellphone in Enterprise Information Security
原文传递
导出
摘要 针对手机泄密途径越来越多的问题,重点分析了当前主要泄密途径,并对针对不同泄密途径的多种解决方案进行对比,提出了一种将企业移动和固定网络融合进行综合管理的解决方案。方案通过将手机物理隔离在办公环境外的方式彻底阻断手机泄密渠道,同时利用微基站将被隔离手机的服务转移到固网,进一步利用认证卡技术解决了固网无法移动的缺点。最终在结合手机移动行和固网安全性同时,解决企业中存在的手机泄密隐患。 Aiming at more and more approaches in secret leakage by cellphones, this article analyzes the principal leakage ways and makes comparison of the existing solutions. Then it discusses a solution based on the converging management of the enterprise' s mobile and fixed network. And the main idea is physical isolation of the cellphones from the office zone, while the mobile services are seamlessly moved into the fixed network through local micro-base. Meanwhile, the certification card technology is also used to solve the fixed network' s lack in mobility. Finally by combining the mobility of cellphone and the security of fixed network, the hidden danger of the enterprise' s secret leakage by cellphone would be fairly solved.
出处 《通信技术》 2012年第12期82-85,90,共5页 Communications Technology
关键词 信息安全 手机泄密 微基站 物理隔离 information security: secret Leakage by cellphone: micro-base: physical isolation
  • 相关文献

参考文献15

二级参考文献27

共引文献46

同被引文献23

  • 1柳青.移动互联网安全问题分析[J].卫星电视与宽带多媒体,2011(9):36-37. 被引量:4
  • 2刘建奇,王以刚.智能手机信息安全防范系统设计与研究[J].信息安全与通信保密,2007,29(2):111-112. 被引量:5
  • 3工业和信息化部电信研究院.移动互联网白皮书[R],2011.
  • 4BRIANBERGSTEIN."员工自带设备"给IBM带来风险[EB/OL].(2012-08-22)[2013-01-31].http://www.techreviewchina.com/story/3758.html.
  • 5中国互联网络信息中心.第32次中国互联网络发展状况统计报告[R].2013-07-17(4).
  • 6工业和信息化部电信研究院.移动互联网白皮书[R],2013.
  • 7张永生,刘保奇.垃圾短信之谜:神秘箱子给j公里内10万手机发信[N].新京报,2013-11-18(A12-A13)[2014-2-28].http://news.sohu.com/20131118/n390292159.shtml.
  • 8MULLINER C, SEIFERT J P, Rise of the iBots: Owning a telco Network[ C]//Proc of the 5th IEEE Int Conf on Malicious and Unwanted Software (Malware). Washing- ton DC : 1EEE Computer Society, 2010 : 71-80.
  • 9TRAYNOR P, LIN M,ONGTANG M,et al. On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core[ C]//Proc of the 16th ACM Conf on CompL, ter and Communications Security. New York:ACM, 2009: 223-234.
  • 10MILLER C. Mobile Attacks and Defense[J]. IEEE Se- curity & Privacy,9(04) :68-70.

引证文献4

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部