Vis enkel innførsel

dc.contributor.advisorBernsmed, Karinnb_NO
dc.contributor.advisorSørensen, Jan Torenb_NO
dc.contributor.authorSandberg, Simen Espesethnb_NO
dc.date.accessioned2014-12-19T14:15:28Z
dc.date.available2014-12-19T14:15:28Z
dc.date.created2013-09-19nb_NO
dc.date.issued2013nb_NO
dc.identifier649788nb_NO
dc.identifierntnudaim:3750nb_NO
dc.identifier.urihttp://hdl.handle.net/11250/262835
dc.description.abstractEndpoints, such as workstations, laptops, tablets and smartphones, may contain sensitive information. How we use such endpoints are changing, as new device types become available, and due to trends such as Bring Your Own Device (BYOD). We discuss how to secure endpoints in modern enterprises in a scalable way.Critical controls based on experience from earlier attacks guide how we discuss methods for different platforms. We identify the most important technical measures, and build a laboratory to test them. We also discuss how an endpoint security policy can guide users such that the technical measures will work efficiently, including in BYOD environments.The tools and devices tested in our laboratory work together to provide security measures that will give good protection, such as complete inventory and effective security configuration. With some changes, the laboratory would work with an endpoint security policy we have drafted for an example enterprise.nb_NO
dc.languageengnb_NO
dc.publisherInstitutt for telematikknb_NO
dc.titleEndpoint security in the modern enterprisenb_NO
dc.typeMaster thesisnb_NO
dc.source.pagenumber146nb_NO
dc.contributor.departmentNorges teknisk-naturvitenskapelige universitet, Fakultet for informasjonsteknologi, matematikk og elektroteknikk, Institutt for telematikknb_NO


Tilhørende fil(er)

Thumbnail
Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel