• Title/Summary/Keyword: MDM Security

Search Result 26, Processing Time 0.034 seconds

A Study on the Efficiency Method of Location-Based Control Function Applied to MDM Applications (MDM 앱에 적용되는 위치 기반 통제 기능의 효율화 방법에 관한 연구)

  • ChangIk Oh;SuGil Hwang;Hyun Son;Dongho Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.171-177
    • /
    • 2023
  • When configuring MDM services only with applications without a central control server, a method that allows security control to be released based on GPS signals in areas sufficiently far from the security area of the workplace is generally applied by embedding and distributing location information of workplaces in MDM applications. This study proposed a method in which each individual directly enters the location information of the security control area needed for them in the distributed app and maintains it as setting information without embedding location information of a specific area such as work in the MDM applications. The method proposed in this study can improve universality, compatibility and the security control level of MDM services, and minimize deployment costs.

Design and Implementation of App Control System for Improving the Security of the Mobile Application (모바일 애플리케이션의 보안성 향상을 위한 App 제어 시스템 설계 및 구현)

  • Lee, Yu-Jun;Jang, Young-Hwan;Park, Seok-Cheon
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.2
    • /
    • pp.243-250
    • /
    • 2016
  • Recently, with the rise of the mobile device, from mobile devices the user who owns the security, speed up the implementation of the guarantee management environment as businesses and individual equipment for the effcient management of the existing system, but the introduction of the MDM MDM App management features administrators to register the App until you can't prvent the security threat. Therefore, this paper addresses these issues in order to improve the security of your application for the control system. The proposed system is a function of the MDM authentication technology to design analysis, and system architecture to help prevent information disclosure within the design and implementation of Mobile-based application control system. Implementation of the control system to assess the security of the international common criteria security evaluation complete the test scenarios on the basis of the test items. An average of 40% of the test results to verify the results of this enhanced security.

Mobile Devices Control System using LSM (리눅스 보안 모듈을 이용한 모바일 장치 통제 시스템)

  • Bae, Hee-sung;Kim, So-yeon;Park, Tae-kyou
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.49-57
    • /
    • 2017
  • With the prevalence of mobile devices, many organizations introduce MDM BYOD and try to increase the level of security with them. However, device control of mobile devices in application level cannot be a solution against the fundamental problems. In this paper, we propose a more flexible and more secure method to control the hardware devices using Linux Security Module in the kernel level with the mandatory access control.

Design of Mobile Office Security System using MDM System and Location Based Information (MDM과 위치정보를 활용한 모바일 오피스 보안 시스템 설계)

  • Park, Min-Gyu;Park, Seok-Cheon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.698-701
    • /
    • 2013
  • 현대 사회는 모바일 장치와 통신기술의 발달로 장소와 상관없이 자유롭게 네트워크에 접속할 수 있게 되었다. 모바일 디바이스 사용자의 폭발적인 증가는 이동성이 보장된 모바일 오피스 환경 구현을 가속화시키고 있으며 개인의 모바일 기기를 업무에 사용하는 경향도 두드러지고 있다. 개인소유 디바이스를 통해 기업 네트워크에 접속하는 횟수가 늘어나면서 기기를 통해 중요한 데이터의 분실이나 유출과 같은 보안 문제를 해결하려는 연구들이 발표되었다. 이와 같은 보안 문제 해결 방안으로 통합적으로 이동 단말을 관리하는 MDM(Mobile Device Management) 시스템 도입이 전망되고 있다. 하지만 아직 MDM 시스템에 대한 위협, 보안에 대한 연구가 미흡하다. 이에 본 논문에서는 보안강화와 효율적인 MDM 시스템 사용을 위해 MDM 시스템을 기반으로 위치정보를 활용하여 모바일 오피스 보안 시스템을 설계하였다.

A Study on Quality Evaluation Model of Mobile Device Management for BYOD (BYOD 환경의 MDM 보안솔루션의 품질평가모델에 관한 연구)

  • Rha, HyeonDae;Kang, SuKyoung;Kim, ChangJae;Lee, NamYong
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.6
    • /
    • pp.93-102
    • /
    • 2014
  • A mobile office environment using mobile devices, such as tablet PC, mobile phone is gradually increased in enterprises, banking and public institutions etc which is no limitation on places. It occurs advanced and persist security threats that are required effective security management policy and technical solution to be secure. For BYOD (Bring Your Own Device) environment, technical security management solutions of network control based, MDM (Mobile Device Management), MAM (Mobile Application Management), MCM (Mobile Contents Management) were released, evolved and mixed used. In perspective of integrated security management solution, mobile security product should be selected to consider user experience and environment and correct quality evaluation model of product is needed which is provided standards and guidance on the selection criteria when it was introduced. In this paper, the most widely used MDM solution is selected to take a look at its features and it was reviewed the product attributes with related international standard ISO/IEC25010 software quality attributes. And then it was derived evaluation elements and calculated the related metrics based on the quality analysis model. For the verification of quality evaluation model, security checks list and testing procedures were established; it applied metrics and analyzed the testing result through scenario based case study.

  • PDF

The Technological Method for Safe Processing of Sensitive Information in Network Separation Environments (망분리 환경에서 민감정보를 안전하게 처리하기 위한 기술적 방안)

  • Juseung Lee;Ilhan Kim;Hyunsoo Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.125-137
    • /
    • 2023
  • Companies that handle sensitive information, led by public institutions, establish separate networks for work and the Internet and protect important data through strong access control measures to prevent cyber attacks. Therefore, systems that involve the junction where the Intranet(internal LAN for work purposes only) and the Internet network are connected require the establishment of a safe security environment through both administrative and technical measures. Mobile Device Management(MDM) solutions to control mobile devices used by institutions are one such example. As this system operates by handling sensitive information such as mobile device information and user information on the Internet network, stringent security measures are required during operation. In this study, a model was proposed to manage sensitive information data processing in systems that must operate on the Internet network by managing it on the internal work network, and the function design and implementation were centered on an MDM solution based on a network interconnection solution.

Individual users based SmartPhone Remote Management System Design and Implementation (개인사용자 기반 스마트폰 원격관리 시스템 설계 및 구현)

  • Kang, Sung-Tae;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.12
    • /
    • pp.2675-2681
    • /
    • 2012
  • By increasing of the population that uses smartphones, problems such as the leakage of private and confidential information due to portable and easy to store and movement of diverse contents occur for a variety of security threats. In this report, it provides helpful information to customers in order to respond various security threat by implementing and designing an remote administration system with using Mobile Device Management (MDM), technology. As a result, customers themselves can prevent information spill by managing remotely from WEB due to the lost and stolen. It is also possible to use control and monitoring.

모바일보안을 위한 MDM의 효과적인 접근 방법

  • Lee, Kang Hyun;Yoon, Doo Shik
    • Review of KIISC
    • /
    • v.23 no.2
    • /
    • pp.29-34
    • /
    • 2013
  • 최근 들어 비즈니스 환경이 모바일과 클라우드 화 되고 있으며, 그에 따른 보안기술은 핵심적인 이슈로 손꼽히고 있다. 모바일 디바이스의 개인과 기업 활용도가 높아지면서 이로 인한 정보 유출 위험성이 심각한 문제로 제기되고 있다. 이를 해결하기 위한 다양한 보안정책이나 가이드가 제시되고 있지만, 모바일 보안에 대하여 명확한 규정이나 솔루션이 없었기 때문에, 보안담당자와 IT기획담당자들은 그 필요성과 적용 방법에 대하여 의문을 가지고 있는 것이 현실이다. 2011년부터 국내 개발사들이 MDM제품을 출시하면서 국내 모바일 업무 환경에 대한 본격적인 보안 해법들이 제시되고 있다. 본 고에서는 모바일 업무 환경에서의 보안에 대한 올바른 이해와 실제적인 적용 방법을 제시하고자 한다.

The design of the expanded BYOD solutions for business mobile users (기업 모바일 사용자를 위한 확장된 BYOD 솔루션의 설계)

  • Park, Jae-Kyung;Kim, Sung-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.10
    • /
    • pp.107-115
    • /
    • 2014
  • In recent years, large companies and public institutions in the Smartphone business purposes has been used a lot. Personal Smartphone are worried about security of personal information only. But if you are a corporate or business purposes requires a more cautious approach. It can destroy an organization's network to hack Smartphones have very serious damage. For this purpose, the existing solution, and try to solve security issues with MDM or MAM. However, Smartphone users discomfort and there is a limit of organizational control. In this paper, we can propose with these issues more broadly would like to suggest. Secure mobile traffic management system enables companies or agencies the ease for users to use a Smartphone. And, for organizations that provide smart phones are more powerful and can provide a means of control. In addition, wired/wireless integration and security measures that can provide new services to offer.

A Case Study on Implementation of Mobile Information Security (모바일 정보보안을 위한 실시간 모바일 기기 제어 및 관리 시스템 설계.구현 사례연구)

  • Kang, Yong-Sik;Kwon, Sun-Dong;Lee, Kang-Hyun
    • Information Systems Review
    • /
    • v.15 no.2
    • /
    • pp.1-19
    • /
    • 2013
  • Smart working sparked by iPhone3 opens a revolution in smart ways of working at any time, regardless of location and environment. Also, It provide real-time information processing and analysis, rapid decision-making and the productivity of businesses, including through the timely response and the opportunity to increase the efficiency. As a result, every company are developing mobile information systems. But company data is accessed from the outside, it has problems to solve like security, hacking and information leakage. Also, Mobile devices such as smart phones belonging to the privately-owned asset can't be always controlled to archive company security policy. In the meantime, public smart phones owned by company was always applied security policy. But it can't not apply to privately-owned smart phones. Thus, this paper is focused to archive company security policy, but also enable the individual's free to use of smart phones when we use mobile information systems. So, when we use smart phone as individual purpose, the normal operation of all smart phone functions. But, when we use smart phone as company purpose like mobile information systems, the smart phone functions are blocked like screen capture, Wi-Fi, camera to protect company data. In this study, we suggest the design and implementation of real time control and management of mobile device using MDM(Mobile Device Management) solution. As a result, we can archive company security policy and individual using of smart phone and it is the optimal solution in the BYOD(Bring Your Own Device) era.

  • PDF