Syndetics cover image
Image from Syndetics

Mobile data loss : threats and countermeasures / Michael T. Raggo.

By: Material type: TextTextPublisher: Waltham, Massachusetts : Syngress, 2016Copyright date: ©2016Description: 1 online resource (55 pages) : illustrations (some color)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780128029015 (e-book)
Subject(s): Genre/Form: Additional physical formats: Print version:: Mobile data loss : threats and countermeasures.DDC classification:
  • 342.0858 23
LOC classification:
  • K3264.C65 .R344 2016
Online resources:
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Ebrary Online Books Ebrary Online Books Colombo Available CBERA10001238
Ebrary Online Books Ebrary Online Books Jaffna Available JFEBRA10001238
Ebrary Online Books Ebrary Online Books Kandy Available KDEBRA10001238
Total holds: 0

Enhanced descriptions from Syndetics:

The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors.- Outlines differences in mobile devices versus PCs- Reviews mobile threat landscape using a hacker mind-set to outline risks and attack vectors- Summarizes the tools and techniques for implementing enterprise countermeasures- Maps mobile to common security compliances including PCI, HIPAA, and CJIS- Provides a defense-in-depth methodology and strategy for enterprises to minimize data loss

Description based on online resource; title from PDF title page (ebrary, viewed January 15, 2016).

Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.

There are no comments on this title.

to post a comment.