透過您的圖書館登入
IP:3.145.119.199
  • 學位論文

企業實施BYOD之安全政策管理平台設計與雛型實作

A Platform of Managing Security Policy for Bring Your Own Device (BYOD) in Enterprise

指導教授 : 陳奕明
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


隨著行動裝置的迅速普及,開啟了數位生活新世代,人們已經習慣隨身攜帶個人行動裝置上班工作,因此許多企業開始希望能實施BYOD(Bring Your Own Device)政策,一方面能讓員工使用個人行動裝置來投入企業的商業流程,為企業節省硬體採購成本與提升整體工作效率;另一方面也讓企業需要面臨新的資訊安全風險,例如員工利用行動裝置的便利性而更容易竊取企業內部機密資料等,因此如何制訂與實施BYOD安全政策成為一項重要的企業資訊安全議題。為解決上述問題,本研究提出企業實施BYOD之安全政策管理平台(SDroid)在安全政策制定方面,本研究提供安全政策制定的操作管理介面,讓資訊安全人員制定企業所需的Install-time與Run-time安全政策,並且利於日後維護。本研究亦提供SDroidAgent應用程式,能即時分析員工所安裝的應用程式皆符合企業制定的安全政策,因此企業不需格外建立專屬應用程式商店或黑白名單機制。本研究的設計特色在於避免修改Android作業系統,以降低日後系統更新或員工接受使用的障礙,本研究亦將資訊統一交由遠端SDroid平台進行分析,可大幅降低行動裝置的運算負擔。本研究提出之企業實施BYOD安全政策管理平台,經實驗證明確實能制定Install-time與Run-time安全政策,並正確地將政策實施於員工的Android行動裝置中,確保員工使用的應用程式皆符合企業安全政策的規範。

並列摘要


According to the popularity of personal mobile devices, more and more people bring their own device to work. The new term of “Bring Your Own Device”, also called BYOD, is appeared. On the one hand, enterprises can reduce their cost of purchasing and improve work efficiency. On the other hand, they also face the risks of information security, such as stealing confidential business information by employee’s own device. Therefore, it’s an important issue that how to formulate and implement the BYOD security policy in the enterprises. In order to solve these problems which enterprise faces, we propose a platform of managing Security policy for Bring Your Own Device (BYOD) in enterprise. We manage security policies those enterprises draft and provide a user interface to set up those policies. This platform receives information from an agent of mobile device and processes those information in run-time analysis. This run-time analysis takes responsibility for matching behaviors of application and security policy. In addition, we rarely modify android operating system and reduce computing of mobile device. Finally, using this proposed mechanism, enterprise can reduce risks of information security.

參考文獻


[29] 張至安, “Android應用程式靜態API分析以及安裝建議系統,” 國立臺灣大學,碩士論文, 2014.
[34] 郭宏毅, “BYOD下兼顧公司安全與員工隱私保護之資訊流追蹤機制研究,” 國立中央大學,碩士論文, 2015.
[25] S. Chung, S. Chung, T. Escrig, Y. Bai, and B. Endicott-Popovsky, “2TAC: Distributed access control architecture for ‘bring your own device’ security,” Proc. 2012 ASE Int. Conf. Biomed. Comput. BioMedCom 2012, no. SocialInformatics, pp. 123–126, 2013.
[17] P.-C. H. and T.-C. C. Chang, J Morris, “Securing BYOD,” IT Prof., vol. 16, no. 5, pp. 9–11, 2014.
[14] “Oxford Dictionaries.” [Online]. Available: http://www.oxfordlearnersdictionaries.com/.

被引用紀錄


郭宏毅(2015)。BYOD 下兼顧公司安全政策與員工隱私保護之資訊流追蹤機制研究〔碩士論文,國立中央大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0031-0412201512073887

延伸閱讀