BOOK
Mobile Computing
(2011)
Additional Information
Book Details
Abstract
According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access corporate resources. 65% of companies surveyed reported security issues. This ebook looks at the security risks of an increasingly mobile workforce and proposes a range of possible solutions. Topics covered include: using personal mobile devices at work (BYOD); password security; data encryption; raising user awareness; securing networks; legal aspects of data security; and the danger of risk trade-offs.
According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access corporate resources. 65% of companies surveyed reported security issues. This ebook looks at the security risks of an increasingly mobile workforce and proposes a range of possible solutions. Written by security experts, topics covered include: using personal mobile devices at work (BYOD); password security; data encryption; raising user awareness and the importance of appropriate security policies; securing networks; legal aspects of data security; and the danger of risk trade-offs.
Table of Contents
| Section Title | Page | Action | Price |
|---|---|---|---|
| Cover | Cover | ||
| CONTENTS | iii | ||
| FOREWORD | iv | ||
| 1 EQUIPPING EMPLOYEES, MAXIMISING POTENTIAL | 1 | ||
| WHAT IS A 'BETTER CONNECTED' WORKFORCE? | 1 | ||
| 'PROSUMERISATION' | 1 | ||
| WHAT ARE THE BUSINESS DRIVERS? | 2 | ||
| LOOKING FORWARD | 2 | ||
| ENSURING SAFE END-USER ADOPTION | 3 | ||
| CONCLUSION | 3 | ||
| 2 CONSUMER DEVICES IN THE WORKPLACE: A BEST-PRACTICE SECURITY APPROACH | 4 | ||
| PUTTING THE RIGHT TOOLS IN PLACE | 4 | ||
| 3 SECURITY ON THE MOVE | 6 | ||
| NOTES | 11 | ||
| 4 MOBILE SECURITY: MINIMISING RISK, MAXIMISING AWARENESS | 12 | ||
| THE LEGAL MINEFIELD | 12 | ||
| THE LAYERED SECURITY MODEL | 13 | ||
| DETERMINING THE SECURITY RISK | 13 | ||
| PERSONAL RESPONSIBILITY | 14 | ||
| 5 DELIVERING SECURITY ON EMPLOYEES' PERSONAL LAPTOPS | 15 | ||
| BENEFITS OF BRING-YOUR-OWN | 15 | ||
| SECURITY DRAWBACKS | 16 | ||
| PLUG-IN SECURITY | 16 | ||
| VIRTUAL WORKSPACES | 17 | ||
| ASSESSING THE BENEFITS | 17 | ||
| NOTES | 17 | ||
| 6 SAFETY TRAINING FOR THE WORKFORCE | 18 | ||
| HOW BIG IS THE ICEBERG? | 18 | ||
| IT'S AS IF NO ONE CARES | 19 | ||
| THE TIME HAS COME FOR ACTION | 19 | ||
| 7 CEOs IN THE DOCK | 21 | ||
| SMARTPHONES ARE MINICOMPUTERS | 21 | ||
| SENIOR MANAGERS ARE PERSONALLY LIABLE | 22 | ||
| TAKING SECURITY MEASURES | 23 | ||
| ARE BUSINESS PEOPLE BREAKING THE LAW? | 24 | ||
| 8 STOPPING THE MOBILE BOT THREAT | 25 | ||
| LACK OF SECURITY | 26 | ||
| MALWARE LAUNCH PAD | 26 | ||
| BLENDED THREATS | 27 | ||
| 9 PASSWORD SECURITY | 28 | ||
| ENFORCING STRONGER PASSWORD POLICIES | 28 | ||
| PASSWORD SECURITY DOES NOT HAVE TO BE A PAIN | 29 | ||
| HIGHER RISK GROUPS | 30 | ||
| TYPES OF ATTACKS | 30 | ||
| 10 ENCRYPTION IS SOMETIMES NOT ENOUGH | 32 | ||
| RISK-RISK TRADE-OFFS | 32 | ||
| THE EFFECTS OF ENCRYPTION | 33 | ||
| NOTES | 34 | ||
| 11 NFC: ANOTHER ONE FOR THE ACRONYM SOUP | 35 | ||
| 12 NETWORK SECURITY WHEN GOING MOBILE | 37 | ||
| NAC = RIP AND REPLACE | 37 | ||
| NAC = ANOTHER BRICK IN THE WALL | 38 | ||
| NAC = THE SECURITY ORCHESTRATOR | 38 | ||
| 13 IMPROVING YOUR NETWORK AND APPLICATION ASSURANCE STRATEGY | 40 | ||
| THE 0DAY MENACE | 40 | ||
| TIERED APPROACH | 41 | ||
| NOTES | 42 | ||
| 14 MOBILE RULES FOR SECURITY OFFICERS: A 'CASE STUDY' | 43 | ||
| MOBILE RULES | 45 | ||
| USEFUL LINKS | 47 | ||
| RESEARCH AND ARTICLES | 47 | ||
| ORGANISATIONS | 47 | ||
| BLOGS | 47 | ||
| OTHER | 48 | ||
| Copyright | 50 |