Amazon cover image
Image from Amazon.com

Mobile data loss : threats and countermeasures / Michael T. Ragoo.

By: Material type: TextTextPublisher: Waltham, MA : Syngress, 2015, c2016Description: (1 online resource) viii;43 pages illustrations ( same color)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 0128028645
  • 9780128028643
Subject(s): Genre/Form: Additional physical formats: Print version:: No title; Print version:: Mobile Data Loss Prevention.DDC classification:
  • 621.3845 23
LOC classification:
  • TK5102.85 RAG
Contents:
Machine generated contents note: ch. 1 Preparing for Generation Mobile -- Introduction -- The Problem -- What's Different about Mobile? -- Secrets to Mobile Data Loss Prevention Success -- Summary -- ch. 2 Understanding Mobile Data Loss Threats -- Mobile Threat Vectors -- Mobile OS Compromise -- Malware and Risky Apps -- User Data Loss -- Mobile Network Threats -- Summary -- ch. 3 Mobile Security Countermeasures -- Mobile OS Compromise -- Malware and Risky Apps -- Access Control and Conditional Access -- Lockdowns and Restrictions -- Live Monitoring, Audit Logs, Events, and Reporting -- Incident Response and Forensics -- Mobile Device Updates and Patching -- Wearables -- Device Encryption and Containers -- PINs, Passwords, and Passcodes -- Cloud -- File-Level Security -- Summary -- ch. 4 Ensuring Mobile Compliance -- PCI -- HIPAA -- CJIS -- Summary -- ch. 5 Developing Your Mobile Device Security Strategy -- Proactive Controls -- Reactive Controls and Protections -- Mobile Data Loss Threats and Countermeasures Flow -- Mobile DLP Methodology -- Futures.
Summary: The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors.
Item type: Books
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Books Books GSU Library Epoch General Stacks TK5102.85RAG (Browse shelf(Opens below)) Available 50000003530

includes index

Machine generated contents note: ch. 1 Preparing for Generation Mobile -- Introduction -- The Problem -- What's Different about Mobile? -- Secrets to Mobile Data Loss Prevention Success -- Summary -- ch. 2 Understanding Mobile Data Loss Threats -- Mobile Threat Vectors -- Mobile OS Compromise -- Malware and Risky Apps -- User Data Loss -- Mobile Network Threats -- Summary -- ch. 3 Mobile Security Countermeasures -- Mobile OS Compromise -- Malware and Risky Apps -- Access Control and Conditional Access -- Lockdowns and Restrictions -- Live Monitoring, Audit Logs, Events, and Reporting -- Incident Response and Forensics -- Mobile Device Updates and Patching -- Wearables -- Device Encryption and Containers -- PINs, Passwords, and Passcodes -- Cloud -- File-Level Security -- Summary -- ch. 4 Ensuring Mobile Compliance -- PCI -- HIPAA -- CJIS -- Summary -- ch. 5 Developing Your Mobile Device Security Strategy -- Proactive Controls -- Reactive Controls and Protections -- Mobile Data Loss Threats and Countermeasures Flow -- Mobile DLP Methodology -- Futures.

The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors.

Description based on print version record.

There are no comments on this title.

to post a comment.
Share