Menu Expand
Mobile Computing

Mobile Computing

(2011)

Additional Information

Book Details

Abstract

According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access corporate resources. 65% of companies surveyed reported security issues. This ebook looks at the security risks of an increasingly mobile workforce and proposes a range of possible solutions. Topics covered include: using personal mobile devices at work (BYOD); password security; data encryption; raising user awareness; securing networks; legal aspects of data security; and the danger of risk trade-offs.
According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access corporate resources. 65% of companies surveyed reported security issues. This ebook looks at the security risks of an increasingly mobile workforce and proposes a range of possible solutions. Written by security experts, topics covered include: using personal mobile devices at work (BYOD); password security; data encryption; raising user awareness and the importance of appropriate security policies; securing networks; legal aspects of data security; and the danger of risk trade-offs.

Table of Contents

Section Title Page Action Price
Cover Cover
CONTENTS iii
FOREWORD iv
1 EQUIPPING EMPLOYEES, MAXIMISING POTENTIAL 1
WHAT IS A 'BETTER CONNECTED' WORKFORCE? 1
'PROSUMERISATION' 1
WHAT ARE THE BUSINESS DRIVERS? 2
LOOKING FORWARD 2
ENSURING SAFE END-USER ADOPTION 3
CONCLUSION 3
2 CONSUMER DEVICES IN THE WORKPLACE: A BEST-PRACTICE SECURITY APPROACH 4
PUTTING THE RIGHT TOOLS IN PLACE 4
3 SECURITY ON THE MOVE 6
NOTES 11
4 MOBILE SECURITY: MINIMISING RISK, MAXIMISING AWARENESS 12
THE LEGAL MINEFIELD 12
THE LAYERED SECURITY MODEL 13
DETERMINING THE SECURITY RISK 13
PERSONAL RESPONSIBILITY 14
5 DELIVERING SECURITY ON EMPLOYEES' PERSONAL LAPTOPS 15
BENEFITS OF BRING-YOUR-OWN 15
SECURITY DRAWBACKS 16
PLUG-IN SECURITY 16
VIRTUAL WORKSPACES 17
ASSESSING THE BENEFITS 17
NOTES 17
6 SAFETY TRAINING FOR THE WORKFORCE 18
HOW BIG IS THE ICEBERG? 18
IT'S AS IF NO ONE CARES 19
THE TIME HAS COME FOR ACTION 19
7 CEOs IN THE DOCK 21
SMARTPHONES ARE MINICOMPUTERS 21
SENIOR MANAGERS ARE PERSONALLY LIABLE 22
TAKING SECURITY MEASURES 23
ARE BUSINESS PEOPLE BREAKING THE LAW? 24
8 STOPPING THE MOBILE BOT THREAT 25
LACK OF SECURITY 26
MALWARE LAUNCH PAD 26
BLENDED THREATS 27
9 PASSWORD SECURITY 28
ENFORCING STRONGER PASSWORD POLICIES 28
PASSWORD SECURITY DOES NOT HAVE TO BE A PAIN 29
HIGHER RISK GROUPS 30
TYPES OF ATTACKS 30
10 ENCRYPTION IS SOMETIMES NOT ENOUGH 32
RISK-RISK TRADE-OFFS 32
THE EFFECTS OF ENCRYPTION 33
NOTES 34
11 NFC: ANOTHER ONE FOR THE ACRONYM SOUP 35
12 NETWORK SECURITY WHEN GOING MOBILE 37
NAC = RIP AND REPLACE 37
NAC = ANOTHER BRICK IN THE WALL 38
NAC = THE SECURITY ORCHESTRATOR 38
13 IMPROVING YOUR NETWORK AND APPLICATION ASSURANCE STRATEGY 40
THE 0DAY MENACE 40
TIERED APPROACH 41
NOTES 42
14 MOBILE RULES FOR SECURITY OFFICERS: A 'CASE STUDY' 43
MOBILE RULES 45
USEFUL LINKS 47
RESEARCH AND ARTICLES 47
ORGANISATIONS 47
BLOGS 47
OTHER 48
Copyright 50