Mobile Data Loss: Threats and Countermeasures
()
About this ebook
The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors.
- Outlines differences in mobile devices versus PCs
- Reviews mobile threat landscape using a hacker mind-set to outline risks and attack vectors
- Summarizes the tools and techniques for implementing enterprise countermeasures
- Maps mobile to common security compliances including PCI, HIPAA, and CJIS
- Provides a defense-in-depth methodology and strategy for enterprises to minimize data loss
Michael T. Raggo
Michael Raggo (CISSP, NSA-IAM, ACE, CSI) has over 20 years of security research experience. His current focus is threats and countermeasures for the mobile enterprise. Michael is the author of “Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols for Syngress Books. A former security trainer, Michael has briefed international defense agencies including the FBI and Pentagon, is a participating member of the PCI Mobile Task Force, and is a frequent presenter at security conferences, including Black Hat, DEF CON, DoD Cyber Crime, InfoSec, SANS, and OWASP.
Related to Mobile Data Loss
Related ebooks
Mobile Malware Infringement and Detection Rating: 0 out of 5 stars0 ratingsMeeting People via WiFi and Bluetooth Rating: 0 out of 5 stars0 ratingsHacking Wireless Access Points: Cracking, Tracking, and Signal Jacking Rating: 0 out of 5 stars0 ratingsBlind Spot: Smartphone and Computer Personal Security Guide Rating: 3 out of 5 stars3/5Mobile Malware Attacks and Defense Rating: 5 out of 5 stars5/5Web Application Vulnerabilities: Detect, Exploit, Prevent Rating: 0 out of 5 stars0 ratingsMobile Security: How to secure, privatize and recover your devices Rating: 5 out of 5 stars5/5Ethical Hacking and Computer Securities for Beginners Rating: 0 out of 5 stars0 ratingsSeven Deadliest Network Attacks Rating: 3 out of 5 stars3/58 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 0 out of 5 stars0 ratingsAndroid Application Security Essentials Rating: 0 out of 5 stars0 ratingsCybersecurity: The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks Rating: 0 out of 5 stars0 ratingsCompsec: For the Home User Rating: 0 out of 5 stars0 ratingsHow to Defeat Advanced Malware: New Tools for Protection and Forensics Rating: 0 out of 5 stars0 ratingsCyber-Physical Attacks: A Growing Invisible Threat Rating: 4 out of 5 stars4/5Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats Rating: 0 out of 5 stars0 ratingsProtect Your Personal Information Rating: 0 out of 5 stars0 ratingsMalware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware Rating: 0 out of 5 stars0 ratingsCyber Security Incident A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsDigital Forensics A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsPractical Malware Prevention Rating: 0 out of 5 stars0 ratingsAVIEN Malware Defense Guide for the Enterprise Rating: 0 out of 5 stars0 ratingsEthical Hacking: A Comprehensive Beginner's Guide to Learn and Understand the Concept of Ethical Hacking Rating: 0 out of 5 stars0 ratingsHack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit Rating: 3 out of 5 stars3/5Anti-Virus Tools and Techniques for Computer Rating: 0 out of 5 stars0 ratingsTrojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code Rating: 4 out of 5 stars4/5Common Windows, Linux and Web Server Systems Hacking Techniques Rating: 0 out of 5 stars0 ratingsSeven Deadliest USB Attacks Rating: 0 out of 5 stars0 ratingsSeven Deadliest Social Network Attacks Rating: 0 out of 5 stars0 ratingsMalware Sandbox A Clear and Concise Reference Rating: 0 out of 5 stars0 ratings
Security For You
How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHacking For Dummies Rating: 4 out of 5 stars4/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5CISSP Study Guide Rating: 4 out of 5 stars4/5Cybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsGame Console Hacking: Xbox, PlayStation, Nintendo, Game Boy, Atari and Sega Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratings
Reviews for Mobile Data Loss
0 ratings0 reviews