Cover image for Mobile Access Safety : Beyond BYOD.
Mobile Access Safety : Beyond BYOD.
Title:
Mobile Access Safety : Beyond BYOD.
Author:
Assing, Dominique.
ISBN:
9781118577981
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (184 pages)
Series:
Iste
Contents:
Title Page -- Contents -- Introduction -- Chapter1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility -- 1.1. A busy day -- 1.2. The ups and downs of the day -- 1.3. What actually happened? -- Chapter 2. Threats and Attacks -- 2.1. Reconnaissance phase -- 2.1.1. Passive mode information gathering techniques -- 2.1.2. Active mode information gathering techniques -- 2.2. Identity/authentication attack -- 2.2.1. ARP spoofing -- 2.2.2. IP spoofing -- 2.2.3. Connection hijacking -- 2.2.4. Man in the middle -- 2.2.5. DNS spoofing -- 2.2.6. Replay attack -- 2.2.7. Rebound intrusion -- 2.2.8. Password hacking -- 2.2.9. The insecurity of SSL/TLS -- 2.3. Confidentiality attack -- 2.3.1. Espionage software -- 2.3.2. Trojans -- 2.3.3. Sniffing -- 2.3.4. Cracking encrypted data -- 2.4. Availability attack -- 2.4.1. ICMP Flood -- 2.4.2. SYN Flood -- 2.4.3. Smurfing -- 2.4.4. Log Flood -- 2.4.5. Worms -- 2.5. Attack on software integrity -- 2.6. BYOD: mixed-genre threats and attacks -- 2.7. Interception of GSM/GPRS/EDGE communications -- Chapter 3. Technological Countermeasures -- 3.1. Prevention -- 3.1.1. Protection of mobile equipment -- 3.1.2. Data protection -- 3.2. Detection -- 3.2.1. Systems of intrusion detection -- 3.2.2. Honeypot -- 3.2.3. Management and supervision tools -- 3.3. Reaction -- 3.3.1. Firewall -- 3.3.2. Reverse proxy -- 3.3.3. Antivirus software -- 3.3.4. Antivirus software: an essential building block but in need of completion -- 3.4. Organizing the information system's security -- 3.4.1. What is security organization? -- 3.4.2. Quality of security, or the attraction of ISMS -- Chapter 4. Technological Countermeasures for Remote Access -- 4.1. Remote connection solutions -- 4.1.1. Historic solutions -- 4.1.2. Desktop sharing solutions -- 4.1.3. Publication on the Internet.

4.1.4. Virtual Private Network (VPN) solutions -- 4.2. Control of remote access -- 4.2.1. Identification and authentication -- 4.2.2. Unique authentication -- 4.3. Architecture of remote access solutions -- 4.3.1. Securing the infrastructure -- 4.3.2. Load balancing/redundancy -- 4.4. Control of conformity of the VPN infrastructure -- 4.5. Control of network admission -- 4.5.1. Control of network access -- 4.5.2. ESCV (Endpoint Security Compliancy Verification) -- 4.5.3. Mobile NAC29 -- Chapter 5. What Should Have Been Done to Make Sure Mr Rowley's Day Really Was Ordinary -- 5.1. The attack at Mr Rowley's house -- 5.1.1. Securing Mr Rowley's PC -- 5.1.2. Securing the organizational level -- 5.1.3. Detection at the organizational level -- 5.1.4. A little bit of prevention -- 5.2. The attack at the airport VIP lounge while on the move -- 5.3. The attack at the café -- 5.4. The attack in the airport VIP lounge during Mr Rowley's return journey -- 5.5. The loss of a smartphone and access to confidential data -- 5.6. Summary of the different security solutions that should have been implemented -- Conclusion -- APPENDICES -- Appendix 1 -- Appendix 2 -- Bibliography -- Index.
Abstract:
Over recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones, laptops, etc.) has increased rapidly. Innovative development perspectives and new tendencies such as BYOD (bring your own device) are exposing business information systems more than ever to various compromising threats. The safety control of remote access has become a strategic issue for all companies. This book reviews all the threats weighing on these remote access points, as well as the existing standards and specific countermeasures to protect companies, from both the technical and organizational points of view. It also reminds us that the organization of safety is a key element in the implementation of an efficient system of countermeasures as well. The authors also discuss the novelty of BYOD, its dangers and how to face them. Contents 1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility. 2.Threats and Attacks. 3. Technological Countermeasures. 4. Technological Countermeasures for Remote Access. 5. What Should Have Been Done to Make Sure Mr Rowley's Day Really Was Ordinary. About the Authors Dominique Assing is a senior security consultant and a specialist in the management and security of information systems in the banking and stock markets sectors. As a security architect and risk manager, he has made information security his field of expertise. Stephane Calé is security manager (CISSP) for a major automobile manufacturer and has more than 15 years of experience of putting in place telecommunications and security infrastructures in an international context.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: