Mobility Investigate

Security Requirements of a Mobile Device Management System

Download now Free registration required

Executive Summary

Many enterprises are adopting Mobile Device Management systems to monitor the status and control the functionalities of Smart phones and Tablet PCs in order to solve the security problems of confidential enterprise data being leaked whenever a device is misused or lost. However, no criteria have been established as yet to evaluate whether such Mobile Device Management systems correctly provide the basic security functions needed by enterprises and whether such functions have been securely developed. Therefore, this paper proposes security requirements of a Mobile Device Management system by modeling a threat and applying a security requirement engineering methodology based on Common Criteria.

  • Format: PDF
  • Size: 236.49 KB