000 03678cam a2200433Ii 4500
001 ocn939419278
003 OCoLC
005 20190328114814.0
006 m o d
007 cr cnu||||||||
008 160215t20152016mau o 000 0 eng d
040 _aLGG
_beng
_erda
_epn
_cLGG
_dOPELS
_dUPM
_dU3W
_dOCLCA
_dD6H
_dOCLCF
020 _a0128028645
_qelectronic bk.
020 _a9780128028643
_qelectronic bk.
020 _z9780128028643
035 _a(OCoLC)939419278
050 4 _aTK5102.85
082 0 4 _a621.3845
_223
100 1 _aRaggo, Michael T.
245 1 0 _aMobile data loss : threats and countermeasures /
_h[electronic resource]
_cMichael T. Ragoo.
264 1 _aWaltham, MA :
_bSyngress,
_c2015, c2016.
300 _a1 online resource.
336 _atext
_2rdacontent
337 _acomputer
_2rdamedia
338 _aonline resource
_2rdacarrier
588 _aDescription based on print version record.
520 _aThe mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors.
505 0 _aMachine generated contents note: ch. 1 Preparing for Generation Mobile -- Introduction -- The Problem -- What's Different about Mobile? -- Secrets to Mobile Data Loss Prevention Success -- Summary -- ch. 2 Understanding Mobile Data Loss Threats -- Mobile Threat Vectors -- Mobile OS Compromise -- Malware and Risky Apps -- User Data Loss -- Mobile Network Threats -- Summary -- ch. 3 Mobile Security Countermeasures -- Mobile OS Compromise -- Malware and Risky Apps -- Access Control and Conditional Access -- Lockdowns and Restrictions -- Live Monitoring, Audit Logs, Events, and Reporting -- Incident Response and Forensics -- Mobile Device Updates and Patching -- Wearables -- Device Encryption and Containers -- PINs, Passwords, and Passcodes -- Cloud -- File-Level Security -- Summary -- ch. 4 Ensuring Mobile Compliance -- PCI -- HIPAA -- CJIS -- Summary -- ch. 5 Developing Your Mobile Device Security Strategy -- Proactive Controls -- Reactive Controls and Protections -- Mobile Data Loss Threats and Countermeasures Flow -- Mobile DLP Methodology -- Futures.
650 0 _aMobile communication systems
_xSecurity measures.
650 0 _aData protection.
650 0 _aMobile computing
_xSecurity measures.
650 0 _aComputer security.
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
650 7 _aData protection.
_2fast
_0(OCoLC)fst00887958
655 4 _aElectronic books.
776 0 8 _iPrint version:
_z9780128028643
_z0128028645
_w(OCoLC)898162305
776 0 8 _iPrint version:
_tMobile Data Loss Prevention.
_dSyngress Media Inc 2015
_z9780128029015
_w(OCoLC)932825388
856 4 0 _3ScienceDirect
_uhttp://www.sciencedirect.com/science/book/9780128028643
999 _c247287
_d247287