关键词:战争散步;系留设备的安全;圈养的政策决定;信息安全;云计算
摘 要:Back in the day, you could bring your personal Blackberry to work in order to access aSoftware as a Service (SaaS) application (if you were in a large building with good cellularreception). Now, you have many device choices for accessing the cloud, from iOs-basedphones and tablets, Android handhelds, to Research In Motion's (RIM) PlayBook. All comewith opportunities for jailbreaking, or gaining root access, by breaking down security to installbanned third-party applications. An infected bring your own device (BYOD) connected to thecorporate network is another security concern. A war walker could steal corporate data byuploading from your BYOD to a personal device. Learn to protect corporate assets with asecurity policy for a cloud-based BYOD environment.