Access Millions of academic & study documents

3 Intel’s standard security controls for company owned devices typi

Content type
User Generated
Showing Page:
1/2
3. Intels standard security controls for company owned
devices typically took two forms, encryption and remote
wipe. However these solutions didnt fit with BYOD. Do
some research at the included links and make a
recommendation for how Intel should secure its corporate
data. a. Sandbox:
http://en.wikipedia.org/wiki/Sandbox_%28computer_securit
y%29 b. Virtualization of divices into personal and work
facets: http://en.wikipedia.org/wiki/Virtual_machine c. App
Wrapping:
http://en.wikipedia.org/wiki/Mobile_application_manageme
nt d. Checking to ensure that a device hasnt been jail
broken: http://en.wikipedia.org/wiki/IOS_jailbreaking
Solution
The various recommendation to intel, for securing its
corporate data is given below:
1) Intel should always upadate its system having corporate
data with latest security patches as well as with operating
system updates patches. Security updates are required, as
it take cares of latest security measures.
2) Rather than having data on local machine, intel should
put data on various virtual machines, and these virtual
machines should not have port for attaching pendrives or

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/2

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
3. Intel’s standard security controls for company owned devices typically took two forms, encryption and remote wipe. However these solutions didn’t fit with BYOD. Do some research at the included links and make a recommendation for how Intel should secure its corporate data. a. Sandbox: http://en.wikipedia.org/wiki/Sandbox_%28computer_securit y%29 b. Virtualization of divices into personal and work facets: http://en.wikipedia.org/wiki/Virtual_machine c. App Wrapping: http://en.wikipedia.org/wiki/Mobile_application_manageme nt d. Checking to ensure that a device hasn’t been jail broken: ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4