Item type | Current library | Collection | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Books | Main library A2 | Computers & Information Technology ( Computer Science ) | 005.8 F.S.M (Browse shelf(Opens below)) | Available | 00009677 |
Includes bibliographical references and index.
Introduction
How Did We Get Here?
The Beginning of the End
Where We Are Now
The Real Problems
What You'll Learn In This Book
A Note on Technology and Terminology
Final Thoughts
What Are You Trying to Protect?
Finding a Definition for Mobile Data
Mobile Data Scenarios
Other Factors to Consider
Defining a Mobile Device
Distinct, but Intertwined
Movable Data, Movable Risk
Following the Path
The Effect on Our Approach
It’s All About the Risk
Loss or Disclosure of Data to Inappropriate Persons
Loss of Money
Loss of Trust or Damage to Your Reputation
You are Not Immune
Risk, Threat, And Value
Evaluating Your Risks
How Valuable Is Your Data?
What about Countermeasures?
The Many Faces of Mobility
Following the Bits
Portable Storage Devices
Tape Storage
Dual-Use Devices
Smartphones and Personal Digital Assistants
Optical Media (CD and DVD)
Portable Computers
Electronic Mail
Instant Messaging and Text Messaging
Data at Rest, Data in Motion
It’s All a Matter of Physics
More Definitions
Protecting Data at Rest
Protecting Data in Motion
Mobile Data Security Models
A Device-Centric Model
A Data-Centric Model
Which Model Do You Choose?
Encryption
The Importance of Standards
Symmetric Encryption
Asymmetric Encryption
When to Use Encryption
Infrastructure and Work Flow Compatibility
Encryption Impediments
Mobile Data Encryption Methods
Defense in Depth: Mobile Security Controls
Countermeasures as Controls
Directive and Administrative Controls
Deterrent Controls
Preventative Controls
Detective Controls
Physical Security
Defense in Depth: Specific Technology Controls
Portable Computer Controls
Dual Use Devices
Smartphones and PDAs
Optical Media
Email
Instant Messaging (IM) and Text Messaging (SMS)
Creating a Mobile Security Policy
Setting the Goal Statement
Mobile Device Issues
Mobile Data Issues
Defining Technology Standards
Data Protection Standards
When are Protections Required?
Building the Business Case for Mobile Security
Identifying the Catalyst
Determining the Impact of the Problem
Describe the Current State of Controls
The Proposed Solution
Program Time Line
Financial Analysis
There are no comments on this title.