Containing the Security Threat of Mobile Apps in Higher Ed
Tallennettuna:
| Julkaisussa: | EDUCAUSE Review (Online) (May 6, 2013) |
|---|---|
| Päätekijä: | |
| Muut tekijät: | , |
| Julkaistu: |
EDUCAUSE
|
| Aiheet: | |
| Linkit: | Citation/Abstract Full Text |
| Tagit: |
Ei tageja, Lisää ensimmäinen tagi!
|
| Abstrakti: | Key Takeaways * Security breaches and data loss become likelier as more students, faculty, and staff bring their own devices to campus. * With a growing number of new offerings touching enterprise data, the time has come for IT managers to put measures in place that ensure mobile data security across the enterprise. * In the area of mobile enterprise applications, an open-source,web-centric platform is good for security and is a solid investment for the future. "2 In corporate America, one-third of organizations are BYOD-friendly, and this percentage is probably greater In higher education.3 Gartner predicts that 65 percent of enterprises will use a mobile device management (MDM) solution by 2017, and Forrester Research predicts that the mobile management services market will reach $6.6 billion by 2015, "a 69 percent increase over a previous forecast issued six months earlier. Multiple higher-education institutions use Kurogo, including: * Harvard University for various mobile campus apps * University of Vermont for a campus mobile website * Brown University for a mobile website and mobile radio module * Algonquin College for a mobile website with location-based services * University of Central Florida for a Health and Fitness module * Michigan State University for an athletics module with integrated Twitter accounts Kuali Mobile and Secure Access Some universities that employ community-source enterprise software developed by the Kuali Foundation are also involved in initiatives to develop the tools they need to extend transaction processing capabilities to the mobile environment. A web-based architecture implemented with open-source PhoneGap uses mobile devices' built-in browsers to perform SSL validation, avoiding the risks of custom validation procedures.10Authentication on the server is achieved using open libraries and standards like the Jasig Central Authentication System (CAS) and the open protocol for secure authorization, OAuth, providing features like single sign-on using technologies whose security can be publicly reviewed. |
|---|---|
| Lähde: | ABI/INFORM Global |