Mobile Data Loss: Threats and Countermeasures
By:
Sign Up Now!
Already a Member? Log In
You must be logged into UK education collection to access this title.
Learn about membership options,
or view our freely available titles.
- Synopsis
- The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors. Outlines differences in mobile devices versus PCsReviews mobile threat landscape using a hacker mind-set to outline risks and attack vectorsSummarizes the tools and techniques for implementing enterprise countermeasuresMaps mobile to common security compliances including PCI, HIPAA, and CJISProvides a defense-in-depth methodology and strategy for enterprises to minimize data loss
- Copyright:
- 2016
Book Details
- Book Quality:
- Publisher Quality
- Book Size:
- 54 Pages
- ISBN-13:
- 9780128029015
- Related ISBNs:
- 9780128028643, 9780128028643
- Publisher:
- Elsevier Science
- Date of Addition:
- 03/25/21
- Copyrighted By:
- Elsevier Science & Technology
- Adult content:
- No
- Language:
- English
- Has Image Descriptions:
- No
- Categories:
- Nonfiction, Computers and Internet, Technology
- Submitted By:
- Bookshare Staff
- Usage Restrictions:
- This is a copyrighted book.