Save up to 30% on Elsevier print and eBooks with free shipping. No promo code needed.
Save up to 30% on print and eBooks.
Mobile Data Loss
Threats and Countermeasures
1st Edition - December 9, 2015
Author: Michael T. Raggo
Language: English
eBook ISBN:9780128029015
9 7 8 - 0 - 1 2 - 8 0 2 9 0 1 - 5
The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is di…Read more
Purchase options
LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code is needed.
The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors.
Outlines differences in mobile devices versus PCs
Reviews mobile threat landscape using a hacker mind-set to outline risks and attack vectors
Summarizes the tools and techniques for implementing enterprise countermeasures
Maps mobile to common security compliances including PCI, HIPAA, and CJIS
Provides a defense-in-depth methodology and strategy for enterprises to minimize data loss
IT and IT security professionals, mobile device users, security professionals
Chapter 1. Preparing for Generation Mobile
Abstract
Introduction
The Problem
What's Different about Mobile?
Secrets to Mobile Data Loss Prevention Success
Summary
Chapter 2. Understanding Mobile Data Loss Threats
Abstract
Mobile Threat Vectors
Mobile OS Compromise
Malware and Risky Apps
User Data Loss
Mobile Network Threats
Summary
Chapter 3. Mobile Security Countermeasures
Abstract
Mobile OS Compromise
Malware and Risky Apps
Access Control and Conditional Access
Lockdowns and Restrictions
Live Monitoring, Audit Logs, Events, and Reporting
Incident Response and Forensics
Mobile Device Updates and Patching
Wearables
Device Encryption and Containers
PINs, Passwords, and Passcodes
Cloud
File-Level Security
Summary
Chapter 4. Ensuring Mobile Compliance
Abstract
PCI
HIPAA
CJIS
Summary
Chapter 5. Developing Your Mobile Device Security Strategy
Abstract
Proactive Controls
Reactive Controls and Protections
Mobile Data Loss Threats and Countermeasures Flow
Mobile DLP Methodology
Futures
Mobile Security Requires a New Approach
No. of pages: 54
Language: English
Edition: 1
Published: December 9, 2015
Imprint: Syngress
eBook ISBN: 9780128029015
MR
Michael T. Raggo
Michael Raggo (CISSP, NSA-IAM, ACE, CSI) has over 20 years of security research experience. His current focus is threats and countermeasures for the mobile enterprise. Michael is the author of “Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols” for Syngress Books. A former security trainer, Michael has briefed international defense agencies including the FBI and Pentagon, is a participating member of the PCI Mobile Task Force, and is a frequent presenter at security conferences, including Black Hat, DEF CON, DoD Cyber Crime, InfoSec, SANS, and OWASP.