Mobile Data Loss: Threats and Countermeasures (Paperback)
暫譯: 行動數據遺失:威脅與對策 (平裝本)

Michael T. Raggo

  • 出版商: Syngress Media
  • 出版日期: 2015-12-15
  • 售價: $1,360
  • 貴賓價: 9.5$1,292
  • 語言: 英文
  • 頁數: 54
  • 裝訂: Paperback
  • ISBN: 0128028645
  • ISBN-13: 9780128028643
  • 海外代購書籍(需單獨結帳)

相關主題

商品描述

The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors.

  • Outlines differences in mobile devices versus PCs
  • Reviews mobile threat landscape using a hacker mind-set to outline risks and attack vectors
  • Summarizes the tools and techniques for implementing enterprise countermeasures
  • Maps mobile to common security compliances including PCI, HIPAA, and CJIS
  • Provides a defense-in-depth methodology and strategy for enterprises to minimize data loss

商品描述(中文翻譯)

行動威脅環境正在演變,帶來新的數據損失形式。組織不再能依賴於在個人電腦時代設計的安全政策。行動設備是不同的,因此需要修訂的對策來減輕數據損失。理解這些差異對於創建針對行動設備的新防禦深度策略至關重要。《行動數據損失:威脅與對策》以駭客的思維方式回顧行動威脅環境,概述包括惡意軟體、風險應用程式、作業系統漏洞、網路攻擊和用戶行為等風險和攻擊向量。這為概述對策提供了基礎,以定義一種全面的行動安全方法論,涵蓋主動保護、響應機制、實時監控和事件響應。設計一個全面的行動安全策略是關鍵。《行動數據損失:威脅與對策》概述了保護設備免受各種數據損失向量的威脅和策略。

- 概述行動設備與個人電腦的差異
- 以駭客的思維方式回顧行動威脅環境,概述風險和攻擊向量
- 總結實施企業對策的工具和技術
- 將行動設備映射到常見的安全合規性,包括 PCI、HIPAA 和 CJIS
- 提供一種防禦深度的方法論和策略,以幫助企業最小化數據損失