首页 | 本学科首页   官方微博 | 高级检索  
     

基于谷歌Android系统的企业级安全防护方法
引用本文:王坤.基于谷歌Android系统的企业级安全防护方法[J].软件,2011,32(9):67-69.
作者姓名:王坤
作者单位:北京邮电大学网络技术研究院,北京,100876
摘    要:随着移动数据技术的进步和通信基础设施建设(如:3G等)的日益成熟与普及,越来越多员工已经不仅仅在办公室处理单位的日常事务,各企事业单位和移动办公人员用手机、PDA和笔记本等移动终端通过公共通信网络(CDMA/GPRS/WCDMA等)访问单位内部的资源和应用,但是,这种通过公共网络接入也给单位网络引入了新的安全威胁,而传统的终端VPN已经满足不了现有的智能手机/平板电脑等移动终端的安全接入需求;一方面,如何保证在开放网络中保障移动终端用户身份和接入安全、数据保密性以及网络边界完整性等安全接入要求,成了移动终端应用推广的重点关切问题,另一方面,由于移动终端容易丢失,如何保证移动终端内存储数据的安全性呢?一旦安全事件爆发,其危害性将远远大于计算机病毒。因此非常有必要深入研究移动终端面临的安全威胁和应对策略。

关 键 词:移动终端  安全威胁  安全防护  Android

Android System-based Security Methods
WANG Kun.Android System-based Security Methods[J].Software,2011,32(9):67-69.
Authors:WANG Kun
Affiliation:WANG Kun (Beijing University of Posts and Telecommunications,Beijing 100876,China)
Abstract:With advances in mobile data technology and communications infrastructure (such as: 3G, etc.) become more sophisticated and popular, more and more people have not only in the office handling daily affairs units, all enterprises and mobile workers with mobile phones, PDA, and laptops and other mobile terminals via public communications networks (CDMA / GPRS / WCDMA, etc.) to access the unit's internal resources and applications, but this also through the public network access unit network introduces new security threats, the traditional VPN has failed to meet the existing smart phone / tablet PCs and other mobile terminals, secure access needs; on the one hand, how to ensure security in open networks in the mobile end-user identity and access security, data confidentiality and integrity of the network boundary, security access requirements, application and popularization of mobile terminals has become the focus of concern, on the other hand, due to the mobile terminal is easy to lose, how to ensure that data is stored within the mobile terminal security? Once the security incident broke out, it will be far greater than the dangers of computer viruses. Therefore, further research is necessary to the security threats facing mobile devices, and coping strategies.
Keywords:mobile devices  security threaten  security protection  Android  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号