Mobile Data Loss - 1st Edition - ISBN: 9780128028643, 9780128029015

Mobile Data Loss

1st Edition

Threats and Countermeasures

Authors: Michael Raggo
eBook ISBN: 9780128029015
Paperback ISBN: 9780128028643
Imprint: Syngress
Published Date: 16th December 2015
Page Count: 54
Sales tax will be calculated at check-out Price includes VAT/GST
25% off
25% off
25% off
25% off
25% off
20% off
20% off
25% off
25% off
25% off
25% off
25% off
20% off
20% off
25% off
25% off
25% off
25% off
25% off
20% off
20% off
29.95
22.46
22.46
22.46
22.46
22.46
23.96
23.96
18.99
14.24
14.24
14.24
14.24
14.24
15.19
15.19
21.95
16.46
16.46
16.46
16.46
16.46
17.56
17.56
Unavailable
Price includes VAT/GST
× DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.

Description

The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors.

Key Features

  • Outlines differences in mobile devices versus PCs
  • Reviews mobile threat landscape using a hacker mind-set to outline risks and attack vectors
  • Summarizes the tools and techniques for implementing enterprise countermeasures
  • Maps mobile to common security compliances including PCI, HIPAA, and CJIS
  • Provides a defense-in-depth methodology and strategy for enterprises to minimize data loss

 

Readership

IT and IT security professionals, mobile device users, security professionals

Table of Contents

  • Dedication
  • Acknowledgments
  • Chapter 1. Preparing for Generation Mobile
    • Abstract
    • Introduction
    • The Problem
    • What's Different about Mobile?
    • Secrets to Mobile Data Loss Prevention Success
    • Summary
  • Chapter 2. Understanding Mobile Data Loss Threats
    • Abstract
    • Mobile Threat Vectors
    • Mobile OS Compromise
    • Malware and Risky Apps
    • User Data Loss
    • Mobile Network Threats
    • Summary
  • Chapter 3. Mobile Security Countermeasures
    • Abstract
    • Mobile OS Compromise
    • Malware and Risky Apps
    • Access Control and Conditional Access
    • Lockdowns and Restrictions
    • Live Monitoring, Audit Logs, Events, and Reporting
    • Incident Response and Forensics
    • Mobile Device Updates and Patching
    • Wearables
    • Device Encryption and Containers
    • PINs, Passwords, and Passcodes
    • Cloud
    • File-Level Security
    • Summary
  • Chapter 4. Ensuring Mobile Compliance
    • Abstract
    • PCI
    • HIPAA
    • CJIS
    • Summary
  • Chapter 5. Developing Your Mobile Device Security Strategy
    • Abstract
    • Proactive Controls
    • Reactive Controls and Protections
    • Mobile Data Loss Threats and Countermeasures Flow
    • Mobile DLP Methodology
    • Futures
    • Mobile Security Requires a New Approach

Details

No. of pages:
54
Language:
English
Copyright:
© Syngress 2016
Published:
Imprint:
Syngress
eBook ISBN:
9780128029015
Paperback ISBN:
9780128028643

About the Author

Michael Raggo

Michael Raggo (CISSP, NSA-IAM, ACE, CSI) has over 20 years of security research experience. His current focus is threats and countermeasures for the mobile enterprise. Michael is the author of “Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols” for Syngress Books. A former security trainer, Michael has briefed international defense agencies including the FBI and Pentagon, is a participating member of the PCI Mobile Task Force, and is a frequent presenter at security conferences, including Black Hat, DEF CON, DoD Cyber Crime, InfoSec, SANS, and OWASP.

Affiliations and Expertise

CISSP, NSA-IAM, ACE, CSI

Reviews

"...offers a high-level view of how your organisation can reap the benefits of mobile devices – such as improved productivity – while minimising the risks...concisely and clearly lays out the issues you need to face and the overall strategies for doing that." --Network Security, Mobile Data Loss

Ratings and Reviews