BOOK
Mobile Computing
(2011)
Additional Information
Book Details
Abstract
According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access corporate resources. 65% of companies surveyed reported security issues. This ebook looks at the security risks of an increasingly mobile workforce and proposes a range of possible solutions. Topics covered include: using personal mobile devices at work (BYOD); password security; data encryption; raising user awareness; securing networks; legal aspects of data security; and the danger of risk trade-offs.
According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access corporate resources. 65% of companies surveyed reported security issues. This ebook looks at the security risks of an increasingly mobile workforce and proposes a range of possible solutions. Written by security experts, topics covered include: using personal mobile devices at work (BYOD); password security; data encryption; raising user awareness and the importance of appropriate security policies; securing networks; legal aspects of data security; and the danger of risk trade-offs.
Table of Contents
Section Title | Page | Action | Price |
---|---|---|---|
Cover | Cover | ||
CONTENTS | iii | ||
FOREWORD | iv | ||
1 EQUIPPING EMPLOYEES, MAXIMISING POTENTIAL | 1 | ||
WHAT IS A 'BETTER CONNECTED' WORKFORCE? | 1 | ||
'PROSUMERISATION' | 1 | ||
WHAT ARE THE BUSINESS DRIVERS? | 2 | ||
LOOKING FORWARD | 2 | ||
ENSURING SAFE END-USER ADOPTION | 3 | ||
CONCLUSION | 3 | ||
2 CONSUMER DEVICES IN THE WORKPLACE: A BEST-PRACTICE SECURITY APPROACH | 4 | ||
PUTTING THE RIGHT TOOLS IN PLACE | 4 | ||
3 SECURITY ON THE MOVE | 6 | ||
NOTES | 11 | ||
4 MOBILE SECURITY: MINIMISING RISK, MAXIMISING AWARENESS | 12 | ||
THE LEGAL MINEFIELD | 12 | ||
THE LAYERED SECURITY MODEL | 13 | ||
DETERMINING THE SECURITY RISK | 13 | ||
PERSONAL RESPONSIBILITY | 14 | ||
5 DELIVERING SECURITY ON EMPLOYEES' PERSONAL LAPTOPS | 15 | ||
BENEFITS OF BRING-YOUR-OWN | 15 | ||
SECURITY DRAWBACKS | 16 | ||
PLUG-IN SECURITY | 16 | ||
VIRTUAL WORKSPACES | 17 | ||
ASSESSING THE BENEFITS | 17 | ||
NOTES | 17 | ||
6 SAFETY TRAINING FOR THE WORKFORCE | 18 | ||
HOW BIG IS THE ICEBERG? | 18 | ||
IT'S AS IF NO ONE CARES | 19 | ||
THE TIME HAS COME FOR ACTION | 19 | ||
7 CEOs IN THE DOCK | 21 | ||
SMARTPHONES ARE MINICOMPUTERS | 21 | ||
SENIOR MANAGERS ARE PERSONALLY LIABLE | 22 | ||
TAKING SECURITY MEASURES | 23 | ||
ARE BUSINESS PEOPLE BREAKING THE LAW? | 24 | ||
8 STOPPING THE MOBILE BOT THREAT | 25 | ||
LACK OF SECURITY | 26 | ||
MALWARE LAUNCH PAD | 26 | ||
BLENDED THREATS | 27 | ||
9 PASSWORD SECURITY | 28 | ||
ENFORCING STRONGER PASSWORD POLICIES | 28 | ||
PASSWORD SECURITY DOES NOT HAVE TO BE A PAIN | 29 | ||
HIGHER RISK GROUPS | 30 | ||
TYPES OF ATTACKS | 30 | ||
10 ENCRYPTION IS SOMETIMES NOT ENOUGH | 32 | ||
RISK-RISK TRADE-OFFS | 32 | ||
THE EFFECTS OF ENCRYPTION | 33 | ||
NOTES | 34 | ||
11 NFC: ANOTHER ONE FOR THE ACRONYM SOUP | 35 | ||
12 NETWORK SECURITY WHEN GOING MOBILE | 37 | ||
NAC = RIP AND REPLACE | 37 | ||
NAC = ANOTHER BRICK IN THE WALL | 38 | ||
NAC = THE SECURITY ORCHESTRATOR | 38 | ||
13 IMPROVING YOUR NETWORK AND APPLICATION ASSURANCE STRATEGY | 40 | ||
THE 0DAY MENACE | 40 | ||
TIERED APPROACH | 41 | ||
NOTES | 42 | ||
14 MOBILE RULES FOR SECURITY OFFICERS: A 'CASE STUDY' | 43 | ||
MOBILE RULES | 45 | ||
USEFUL LINKS | 47 | ||
RESEARCH AND ARTICLES | 47 | ||
ORGANISATIONS | 47 | ||
BLOGS | 47 | ||
OTHER | 48 | ||
Copyright | 50 |