9781848214354

Mobile Access Safety Beyond BYOD

by ; ; ;
  • ISBN13:

    9781848214354

  • ISBN10:

    1848214359

  • Format: Hardcover
  • Copyright: 3/4/2013
  • Publisher: Iste/Hermes Science Pub
  • Purchase Benefits
  • Free Shipping On Orders Over $59!
    Your order must be $59 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now

Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The eBook copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Summary

Over recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones, laptops, etc.) has increased rapidly. Innovative development perspectives and new tendencies such as BYOD (bring your own device) are exposing business information systems more than ever to various compromising threats. The safety control of remote access has become a strategic issue for all companies. This book reviews all the threats weighing on these remote access points, as well as the existing standards and specific countermeasures to protect companies, from both the technical and organizational points of view. It also reminds us that the organization of safety is a key element in the implementation of an efficient system of countermeasures as well. The authors also discuss the novelty of BYOD, its dangers and how to face them.

Contents

1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility.
2.Threats and Attacks.
3. Technological Countermeasures.
4. Technological Countermeasures for Remote Access.
5. What Should Have Been Done to Make Sure Mr Rowley’s Day Really Was Ordinary.

About the Authors

Dominique Assing is a senior security consultant and a specialist in the management and security of information systems in the banking and stock markets sectors. As a security architect and risk manager, he has made information security his field of expertise.
Stephane Calé is security manager (CISSP) for a major automobile manufacturer and has more than 15 years of experience of putting in place telecommunications and security infrastructures in an international context.

Table of Contents

Preface

Introduction

Chapter 1 – An ordinary in the life of M. Rowley, or the dangers of virtualization and mobility.

Chapter 2 – Threats and attacks

Chapter 3 – Technological countermeasures

Chapter 4 – Technological countermeasures for remote access

Chapter 5 – What should have been done for M. Rowley’s day to be ordinary

Conclusion

Appendix 1 – Recap of security solutions

Appendix 2 – Glossary

Rewards Program

Write a Review