Accessing information systems with mobile devices and information security

  • Authors:
  • Blaž Markelj;Igor Bernik

  • Affiliations:
  • -;-

  • Venue:
  • AICT'11 Proceedings of the 2nd international conference on Applied informatics and computing theory
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

The most technologically advanced mobile devices are changing communications and the way we access data and information. The number of people who use mobile devices is rising exponentially, even in countries of the third world - at the same time, information security is decreasing (Best, Smyth, Etherton and Wornyo, 2010; Goodman and Harris, 2010). Mobile devices are under attack from various threats. These threats can act individually or in combinations (blended threats). The risk is greatest, when a user accesses corporate information systems via mobile devices and public networks. Users are becoming more aware of the importance of information security. Providers of security software have already perceived the need to implement control over the transfer of data from the Internet to mobile devices. Users are usually the weakest link in information security. Each corporation with its own information system should implement internal safety standards and regulate the use of mobile devices, software, protocols and public networks. It is crucial to constantly educate users about information security and measures to protect private and corporate data.