Mobile data loss: threats and countermeasures
The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, MA
Syngress
2015, c2016
|
Schlagworte: | |
Online-Zugang: | FAW01 FLA01 Volltext |
Zusammenfassung: | The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors |
Beschreibung: | 1 online resource |
ISBN: | 0128028645 9780128028643 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044390217 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 170630s2015 |||| o||u| ||||||eng d | ||
020 | |a 0128028645 |9 0-12-802864-5 | ||
020 | |a 9780128028643 |9 978-0-12-802864-3 | ||
020 | |a 9780128028643 |9 978-0-12-802864-3 | ||
035 | |a (ZDB-33-ESD)ocn939419278 | ||
035 | |a (OCoLC)939419278 | ||
035 | |a (DE-599)BVBBV044390217 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 621.3845 |2 23 | |
100 | 1 | |a Raggo, Michael T. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Mobile data loss |b threats and countermeasures |c Michael T. Ragoo |
264 | 1 | |a Waltham, MA |b Syngress |c 2015, c2016 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors | ||
650 | 4 | |a Mobile communication systems |x Security measures | |
650 | 4 | |a Data protection | |
650 | 4 | |a Mobile computing |x Security measures | |
650 | 4 | |a Computer security | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780128028643 |z 0128028645 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |t Mobile Data Loss Prevention |d Syngress Media Inc 2015 |z 9780128029015 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780128028643 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029792439 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9780128028643 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext | |
966 | e | |u http://www.sciencedirect.com/science/book/9780128028643 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804177662227251200 |
---|---|
any_adam_object | |
author | Raggo, Michael T. |
author_facet | Raggo, Michael T. |
author_role | aut |
author_sort | Raggo, Michael T. |
author_variant | m t r mt mtr |
building | Verbundindex |
bvnumber | BV044390217 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-ESD)ocn939419278 (OCoLC)939419278 (DE-599)BVBBV044390217 |
dewey-full | 621.3845 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.3845 |
dewey-search | 621.3845 |
dewey-sort | 3621.3845 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02724nmm a2200433zc 4500</leader><controlfield tag="001">BV044390217</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170630s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128028645</subfield><subfield code="9">0-12-802864-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128028643</subfield><subfield code="9">978-0-12-802864-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128028643</subfield><subfield code="9">978-0-12-802864-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn939419278</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)939419278</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044390217</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.3845</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Raggo, Michael T.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mobile data loss</subfield><subfield code="b">threats and countermeasures</subfield><subfield code="c">Michael T. Ragoo</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2015, c2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780128028643</subfield><subfield code="z">0128028645</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="t">Mobile Data Loss Prevention</subfield><subfield code="d">Syngress Media Inc 2015</subfield><subfield code="z">9780128029015</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780128028643</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029792439</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128028643</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128028643</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044390217 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:51:38Z |
institution | BVB |
isbn | 0128028645 9780128028643 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029792439 |
oclc_num | 939419278 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 online resource |
psigel | ZDB-33-ESD ZDB-33-EBS ZDB-33-ESD FAW_PDA_ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Syngress |
record_format | marc |
spelling | Raggo, Michael T. Verfasser aut Mobile data loss threats and countermeasures Michael T. Ragoo Waltham, MA Syngress 2015, c2016 1 online resource txt rdacontent c rdamedia cr rdacarrier The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors Mobile communication systems Security measures Data protection Mobile computing Security measures Computer security Erscheint auch als Druck-Ausgabe 9780128028643 0128028645 Erscheint auch als Druck-Ausgabe Mobile Data Loss Prevention Syngress Media Inc 2015 9780128029015 http://www.sciencedirect.com/science/book/9780128028643 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Raggo, Michael T. Mobile data loss threats and countermeasures Mobile communication systems Security measures Data protection Mobile computing Security measures Computer security |
title | Mobile data loss threats and countermeasures |
title_auth | Mobile data loss threats and countermeasures |
title_exact_search | Mobile data loss threats and countermeasures |
title_full | Mobile data loss threats and countermeasures Michael T. Ragoo |
title_fullStr | Mobile data loss threats and countermeasures Michael T. Ragoo |
title_full_unstemmed | Mobile data loss threats and countermeasures Michael T. Ragoo |
title_short | Mobile data loss |
title_sort | mobile data loss threats and countermeasures |
title_sub | threats and countermeasures |
topic | Mobile communication systems Security measures Data protection Mobile computing Security measures Computer security |
topic_facet | Mobile communication systems Security measures Data protection Mobile computing Security measures Computer security |
url | http://www.sciencedirect.com/science/book/9780128028643 |
work_keys_str_mv | AT raggomichaelt mobiledatalossthreatsandcountermeasures |