Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.
Questions About This Book?
- The eBook copy of this book is not guaranteed to include any supplemental materials. Typically only the book itself is included.
Over recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones, laptops, etc.) has increased rapidly. Innovative development perspectives and new tendencies such as BYOD (bring your own device) are exposing business information systems more than ever to various compromising threats. The safety control of remote access has become a strategic issue for all companies. This book reviews all the threats weighing on these remote access points, as well as the existing standards and specific countermeasures to protect companies, from both the technical and organizational points of view. It also reminds us that the organization of safety is a key element in the implementation of an efficient system of countermeasures as well. The authors also discuss the novelty of BYOD, its dangers and how to face them.
1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility.
2.Threats and Attacks.
3. Technological Countermeasures.
4. Technological Countermeasures for Remote Access.
5. What Should Have Been Done to Make Sure Mr Rowley’s Day Really Was Ordinary.
About the Authors
Dominique Assing is a senior security consultant and a specialist in the management and security of information systems in the banking and stock markets sectors. As a security architect and risk manager, he has made information security his field of expertise.
Stephane Calé is security manager (CISSP) for a major automobile manufacturer and has more than 15 years of experience of putting in place telecommunications and security infrastructures in an international context.
Table of Contents
Chapter 1 – An ordinary in the life of M. Rowley, or the dangers of virtualization and mobility.
Chapter 2 – Threats and attacks
Chapter 3 – Technological countermeasures
Chapter 4 – Technological countermeasures for remote access
Chapter 5 – What should have been done for M. Rowley’s day to be ordinary
Appendix 1 – Recap of security solutions
Appendix 2 – Glossary