innerBanner.jpg

FUE Central Library

Image from Google Jackets

Mobile device security : a comprehensive guide to securing your information in a moving world / Stephen Fried.

By: Material type: TextTextPublication details: Boca Raton, FL : Auerbach Publications, 2010.Description: xxviii, 274 pages. : illustrations ; 25 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781439820162 (alk. paper)
Subject(s): DDC classification:
  • 005.8 22 F.S.M
LOC classification:
  • HF5548.37 .F75 2010
Contents:
Introduction How Did We Get Here? The Beginning of the End Where We Are Now The Real Problems What You'll Learn In This Book A Note on Technology and Terminology Final Thoughts What Are You Trying to Protect? Finding a Definition for Mobile Data Mobile Data Scenarios Other Factors to Consider Defining a Mobile Device Distinct, but Intertwined Movable Data, Movable Risk Following the Path The Effect on Our Approach It’s All About the Risk Loss or Disclosure of Data to Inappropriate Persons Loss of Money Loss of Trust or Damage to Your Reputation You are Not Immune Risk, Threat, And Value Evaluating Your Risks How Valuable Is Your Data? What about Countermeasures? The Many Faces of Mobility Following the Bits Portable Storage Devices Tape Storage Dual-Use Devices Smartphones and Personal Digital Assistants Optical Media (CD and DVD) Portable Computers Electronic Mail Instant Messaging and Text Messaging Data at Rest, Data in Motion It’s All a Matter of Physics More Definitions Protecting Data at Rest Protecting Data in Motion Mobile Data Security Models A Device-Centric Model A Data-Centric Model Which Model Do You Choose? Encryption The Importance of Standards Symmetric Encryption Asymmetric Encryption When to Use Encryption Infrastructure and Work Flow Compatibility Encryption Impediments Mobile Data Encryption Methods Defense in Depth: Mobile Security Controls Countermeasures as Controls Directive and Administrative Controls Deterrent Controls Preventative Controls Detective Controls Physical Security Defense in Depth: Specific Technology Controls Portable Computer Controls Dual Use Devices Smartphones and PDAs Optical Media Email Instant Messaging (IM) and Text Messaging (SMS) Creating a Mobile Security Policy Setting the Goal Statement Mobile Device Issues Mobile Data Issues Defining Technology Standards Data Protection Standards When are Protections Required? Building the Business Case for Mobile Security Identifying the Catalyst Determining the Impact of the Problem Describe the Current State of Controls The Proposed Solution Program Time Line Financial Analysis
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books Main library A2 Computers & Information Technology ( Computer Science ) 005.8 F.S.M (Browse shelf(Opens below)) Available 00009677

Includes bibliographical references and index.

Introduction

How Did We Get Here?

The Beginning of the End

Where We Are Now

The Real Problems

What You'll Learn In This Book

A Note on Technology and Terminology

Final Thoughts

What Are You Trying to Protect?

Finding a Definition for Mobile Data

Mobile Data Scenarios

Other Factors to Consider

Defining a Mobile Device

Distinct, but Intertwined

Movable Data, Movable Risk

Following the Path

The Effect on Our Approach

It’s All About the Risk

Loss or Disclosure of Data to Inappropriate Persons

Loss of Money

Loss of Trust or Damage to Your Reputation

You are Not Immune

Risk, Threat, And Value

Evaluating Your Risks

How Valuable Is Your Data?

What about Countermeasures?

The Many Faces of Mobility

Following the Bits

Portable Storage Devices

Tape Storage

Dual-Use Devices

Smartphones and Personal Digital Assistants

Optical Media (CD and DVD)

Portable Computers

Electronic Mail

Instant Messaging and Text Messaging

Data at Rest, Data in Motion

It’s All a Matter of Physics

More Definitions

Protecting Data at Rest

Protecting Data in Motion

Mobile Data Security Models

A Device-Centric Model

A Data-Centric Model

Which Model Do You Choose?

Encryption

The Importance of Standards

Symmetric Encryption

Asymmetric Encryption

When to Use Encryption

Infrastructure and Work Flow Compatibility

Encryption Impediments

Mobile Data Encryption Methods

Defense in Depth: Mobile Security Controls

Countermeasures as Controls

Directive and Administrative Controls

Deterrent Controls

Preventative Controls

Detective Controls

Physical Security

Defense in Depth: Specific Technology Controls

Portable Computer Controls

Dual Use Devices

Smartphones and PDAs

Optical Media

Email

Instant Messaging (IM) and Text Messaging (SMS)

Creating a Mobile Security Policy

Setting the Goal Statement

Mobile Device Issues

Mobile Data Issues

Defining Technology Standards

Data Protection Standards

When are Protections Required?

Building the Business Case for Mobile Security

Identifying the Catalyst

Determining the Impact of the Problem

Describe the Current State of Controls

The Proposed Solution

Program Time Line

Financial Analysis

There are no comments on this title.

to post a comment.

Copyright © 2023, Future University Egypt. All rights reserved.