Mobile Access Safety Beyond BYOD 1st Edition by Dominique Assing, Stephane Cale – Ebook PDF Instant Download/Delivery: 1848214359, 9781848214354
Full download Mobile Access Safety Beyond BYOD 1st Edition after payment

Product details:
ISBN 10: 1848214359
ISBN 13: 9781848214354
Author: Dominique Assing, Stephane Cale
Mobile Access Safety Beyond BYOD 1st Table of contents:
Chapter1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility
1.1. A busy day
1.2. The ups and downs of the day
1.3. What actually happened?
Chapter 2. Threats and Attacks
2.1. Reconnaissance phase
2.1.1. Passive mode information gathering techniques
2.1.2. Active mode information gathering techniques
2.2. Identity/authentication attack
2.2.1. ARP spoofing
2.2.2. IP spoofing
2.2.3. Connection hijacking
2.2.4. Man in the middle
2.2.5. DNS spoofing
2.2.6. Replay attack
2.2.7. Rebound intrusion
2.2.8. Password hacking
2.2.9. The insecurity of SSL/TLS
2.3. Confidentiality attack
2.3.1. Espionage software
2.3.2. Trojans
2.3.3. Sniffing
2.3.4. Cracking encrypted data
2.4. Availability attack
2.4.1. ICMP Flood
2.4.2. SYN Flood
2.4.3. Smurfing
2.4.4. Log Flood
2.4.5. Worms
2.5. Attack on software integrity
2.6. BYOD: mixed-genre threats and attacks
2.7. Interception of GSM/GPRS/EDGE communications
Chapter 3. Technological Countermeasures
3.1. Prevention
3.1.1. Protection of mobile equipment
3.1.2. Data protection
3.2. Detection
3.2.1. Systems of intrusion detection
3.2.2. Honeypot
3.2.3. Management and supervision tools
3.3. Reaction
3.3.1. Firewall
3.3.2. Reverse proxy
3.3.3. Antivirus software
3.3.4. Antivirus software: an essential building block but in need of completion
3.4. Organizing the information system’s security
3.4.1. What is security organization?
3.4.2. Quality of security, or the attraction of ISMS
Chapter 4. Technological Countermeasures for Remote Access
4.1. Remote connection solutions
4.1.1. Historic solutions
4.1.2. Desktop sharing solutions
4.1.3. Publication on the Internet
4.1.4. Virtual Private Network (VPN) solutions
4.2. Control of remote access
4.2.1. Identification and authentication
4.2.2. Unique authentication
4.3. Architecture of remote access solutions
4.3.1. Securing the infrastructure
4.3.2. Load balancing/redundancy
4.4. Control of conformity of the VPN infrastructure
4.5. Control of network admission
4.5.1. Control of network access
4.5.2. ESCV (Endpoint Security Compliancy Verification)
4.5.3. Mobile NAC29
Chapter 5. What Should Have Been Done to Make Sure Mr Rowley’s Day Really Was Ordinary
5.1. The attack at Mr Rowley’s house
5.1.1. Securing Mr Rowley’s PC
5.1.2. Securing the organizational level
5.1.3. Detection at the organizational level
5.1.4. A little bit of prevention
5.2. The attack at the airport VIP lounge while on the move
5.3. The attack at the café
5.4. The attack in the airport VIP lounge during Mr Rowley’s return journey
5.5. The loss of a smartphone and access to confidential data
5.6. Summary of the different security solutions that should have been implemented
People also search for Mobile Access Safety Beyond BYOD 1st:
mobile access safety beyond byod
mobile access management
mobile byod security
mobile access control systems
byod network access control
Tags:
Dominique Assing,Stephane Cale,Mobile Access,Safety,BYOD


