万本电子书0元读

万本电子书0元读

顶部广告

Mobile Security: How to secure, privatize and recover your devices电子书

售       价:¥

3人正在读 | 0人评论 9.8

作       者:Tim Speed

出  版  社:Packt Publishing

出版时间:2013-09-10

字       数:219.0万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private.Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.
目录展开

Mobile Security: How to Secure, Privatize, and Recover Your Devices

Table of Contents

Mobile Security: How to Secure, Privatize, and Recover Your Devices

Credits

Foreword

About the Authors

About the Reviewers

www.PacktPub.com

Support files, eBooks, discount offers and more

Why Subscribe?

Free Access for Packt account holders

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Errata

Piracy

Questions

1. Living in a Mobile World

The dangers of mobile computers

A widespread lack of awareness

Malware and viruses

Understanding legitimate programs

Precursors to the smartphone revolution – Internet, social-networking, and spam

Social networking

The two-way street of social networking

2012 is the new 1984 – how companies track us

Facebook and customer tracking

The new mobile world

Making a smartphone smart

The iPhone – why every phone secretly wants to be a smartphone

The difference between Android and iOS

Mobile purchasing and identification methods – who needs credit cards?

CueCats and QR codes

Mobile finance – buying and selling in the mobile marketplace

The cloud

The risks of cloud computing

Summary

2. Users and Mobile Device Management

Protecting the corporations

Corporate security policies

Corporate security procedures

Frontend network protection

Mobile and business

Buying your device

Mobile Device Management

Does your company trust your device?

Details of MDM

MDM end user benefits and impacts

Jailbreak and rooting

Digital Rights Management

MDM solutions and products

Acceptable use policy (AUP)

Power users

Power user tools

iPhone configuration tools

Android configuration tools

Configuration

Simple tether configuration tool

Simple router configuration

Lookout

Quick settings

The hidden world (some advanced information)

Summary

3. Privacy – Small Word, Big Consequences

Troy and You

Data good enough to steal

Cookies, cookies everywhere

They are watching you…and they know your name

What's in it for the information thieves?

Good idea, mixed results

Reach out and touch

Touch, but don't break

And that's only the first part…

Hidden "features"

The fallout

Who has your data? Round 1…

The truth is out there

And now the rest of the story

Who has your data? Round 2…

Who has your data? Round 3…

Who has your data? The final stretch…

Your data in their hands

Will your money be "too" mobile?

Bring your mobile device to work day

Steps you can take to protect yourself

Summary

4. Mobile and Social – the Threats You Should Know About

A prediction of the future (and the lottery numbers for next week) scams

Malware

Toll fraud

SMS spoofing

Social engineering

Phishing

Types of phishing

Spear phishing

How spear phishing works

Other examples

Receiving e-mails from a "friend"

Using your web presence against you

Keeping your secrets secret

Passwords that work

Patches, updates, and security software

Be vigilant

Cloud computing security

How it works

The mobile user's security

Cloud security

Virus/worms/others

Future threats

Steps you can take to protect yourself

Summing it up

Summary

5. Protecting Your Mobile Devices

Identifying your phone – the numbers that set your device apart

Preventative measures – how to reduce the likelihood that your device will be hacked

iPhone

Android

For any device

Think twice before jailbreaking or rooting

Safety in numbers – passwords and user IDs

Using strong passwords

Longer and varied passwords

Changing passwords

Data encryption

Encryption on iOS

Encryption on Android

Downloaded applications

Antivirus software on smartphones

Verifying that an application is legitimate

In the event that your device has been compromised

Has your device been hacked?

Social engineering

Trojans and malware on your smartphone

SMS messaging attacks

Attacks through attachment and application downloads

Compromised accounts

Stolen or lost devices

Wiping an iOS device

Wiping an Android device

Summing up

Summary

6. Support and Warranty Insurance

Toby's story

The smartphone – a personal device, a company device, or both?

The wide world of customer service and technical support

Customer support in the mobile space – phone, chat, and text

Customer support by phone

Chat and texting solutions

SMS text

The Service Level Agreement (SLA)

OS operators, manufacturers, and service providers

Hardware

Other device issues

Operating system or user interface

Application issues

How to get the most out of your technical support experience if you have a malfunction

Before you make the call – information, password problems, and your malfunction

How to make the most of your time while on the line

Answer every question

Do not skip steps when describing your problem

Test your device

What to do if your malfunction has not been resolved

Warranties in the mobile space

Basic terms

Navigating the web of warranties

Summing it up

Warranties

Definitions

Types of extended warranties

Extended warranty coverage

Extended warranty considerations

To purchase an extended warranty or not?

In a nutshell

Summary

7. Baby Boomers, Teens, and Tweens

The boom in baby boomers

Colliding generations

Speaking of the younger generation…

Texting, sexting, and the Internet

Strangers and dangers

And unlimited damage

Summary

8. Getting Your Life Back After You've Been Hacked

Device profiles

The Apple profile

Apple backup

The Android profile

Android backup

Have you been hacked?

Knowing the difference – device hacks, profile hacks, or both

In the event of a hack

The device type (BYOD or the corporate device)

BYOD

Who to contact

To wipe or not to wipe – partial or complete

What to do and when to do it – a list in the event that you've been hacked

Summing it up

Summary

A. IBM Notes Traveler

The architectural design of the IBM Notes Traveler service

Determining the correct deployment approach

Review of the IBM Notes Traveler Server

Overview of different clients

Access to the IBM Notes Traveler Servers

Communication to the devices

Location of the IBM Notes Traveler Servers

Location of the mail servers

Connection methodologies to the Traveler servers

Direct connection

Reverse proxy

IBM Mobile Connect

VPN connection

Establishing appropriate security settings

Important review information

Licensing information for IBM Notes Traveler

B. Mobile Device Management

Types of devices in the environment

Consumer-focused devices

Mobile information

Messaging, calendar, and personal information management

Collaboration and corporate applications

Generally available applications

Mobile security policies in the environment

Corporate data and information

Network/communications

Devices

Legal requirements and government regulations

Determining the types of devices that will be supported

Determine if a pure MDM solution is required in the environment

Elements of device management

Specific management of the device

Leveraging MDM for application management

Management of data on the device

Access control

Potential solutions

Summary

C. Tips to Help You Protect Your Mobile Device

D. Mobile Acceptable Use Policy Template

Mobile device acceptable use policy

Overview

Policy applicability

Rules

Disciplinary action

Company owned devices

Overview

Rules for corporate devices

Rules

Disciplinary action

Glossary

Procedure to enable a device for corporate access

E. The History of Social Networking, the Internet, and Smartphones

The Internet

Social networking

Mobiles

The difference between Android and iOS

Let's not forget Windows

Text messaging, chatting, and video chatting

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部