Mobile Security : How to secure, privatize and recover your devices.

By: Speed, TimothyContributor(s): Nykamp, Darla | Anderson, Joseph | Anderson, Joseph | Nampalli, JayaPublisher: Olton : Packt Publishing, Limited, 2013Copyright date: ©2013Description: 1 online resource (294 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9781849693615Subject(s): Mobile computing -- Security measures.;Mobile communication systems -- Security measuresGenre/Form: Electronic books. Additional physical formats: Print version:: Mobile Security : How to secure, privatize and recover your devicesDDC classification: 004.165 LOC classification: QA76.59 -- .M635 2013ebOnline resources: Click to View
Contents:
Intro -- Mobile Security: How to Secure, Privatize, and Recover Your Devices -- Table of Contents -- Mobile Security: How to Secure, Privatize, and Recover Your Devices -- Credits -- Foreword -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Support files, eBooks, discount offers and more -- Why Subscribe? -- Free Access for Packt account holders -- Preface -- What this book covers -- What you need for this book -- Who this book is for -- Conventions -- Reader feedback -- Customer support -- Errata -- Piracy -- Questions -- 1. Living in a Mobile World -- The dangers of mobile computers -- A widespread lack of awareness -- Malware and viruses -- Understanding legitimate programs -- Precursors to the smartphone revolution - Internet, social-networking, and spam -- Social networking -- The two-way street of social networking -- 2012 is the new 1984 - how companies track us -- Facebook and customer tracking -- The new mobile world -- Making a smartphone smart -- The iPhone - why every phone secretly wants to be a smartphone -- The difference between Android and iOS -- Mobile purchasing and identification methods - who needs credit cards? -- CueCats and QR codes -- Mobile finance - buying and selling in the mobile marketplace -- The cloud -- The risks of cloud computing -- Summary -- 2. Users and Mobile Device Management -- Protecting the corporations -- Corporate security policies -- Corporate security procedures -- Frontend network protection -- Mobile and business -- Buying your device -- Mobile Device Management -- Does your company trust your device? -- Details of MDM -- MDM end user benefits and impacts -- Jailbreak and rooting -- Digital Rights Management -- MDM solutions and products -- Acceptable use policy (AUP) -- Power users -- Power user tools -- iPhone configuration tools -- Android configuration tools -- Configuration.
Simple tether configuration tool -- Simple router configuration -- Lookout -- Quick settings -- The hidden world (some advanced information) -- Summary -- 3. Privacy - Small Word, Big Consequences -- Troy and You -- Data good enough to steal -- Cookies, cookies everywhere -- They are watching you…and they know your name -- What's in it for the information thieves? -- Good idea, mixed results -- Reach out and touch -- Touch, but don't break -- And that's only the first part… -- Hidden "features -- The fallout -- Who has your data? Round 1… -- The truth is out there -- And now the rest of the story -- Who has your data? Round 2… -- Who has your data? Round 3… -- Who has your data? The final stretch… -- Your data in their hands -- Will your money be "too" mobile? -- Bring your mobile device to work day -- Steps you can take to protect yourself -- Summary -- 4. Mobile and Social - the Threats You Should Know About -- A prediction of the future (and the lottery numbers for next week) scams -- Malware -- Toll fraud -- SMS spoofing -- Social engineering -- Phishing -- Types of phishing -- Spear phishing -- How spear phishing works -- Other examples -- Receiving e-mails from a "friend -- Using your web presence against you -- Keeping your secrets secret -- Passwords that work -- Patches, updates, and security software -- Be vigilant -- Cloud computing security -- How it works -- The mobile user's security -- Cloud security -- Virus/worms/others -- Future threats -- Steps you can take to protect yourself -- Summing it up -- Summary -- 5. Protecting Your Mobile Devices -- Identifying your phone - the numbers that set your device apart -- Preventative measures - how to reduce the likelihood that your device will be hacked -- iPhone -- Android -- For any device -- Think twice before jailbreaking or rooting -- Safety in numbers - passwords and user IDs.
Using strong passwords -- Longer and varied passwords -- Changing passwords -- Data encryption -- Encryption on iOS -- Encryption on Android -- Downloaded applications -- Antivirus software on smartphones -- Verifying that an application is legitimate -- In the event that your device has been compromised -- Has your device been hacked? -- Social engineering -- Trojans and malware on your smartphone -- SMS messaging attacks -- Attacks through attachment and application downloads -- Compromised accounts -- Stolen or lost devices -- Wiping an iOS device -- Wiping an Android device -- Summing up -- Summary -- 6. Support and Warranty Insurance -- Toby's story -- The smartphone - a personal device, a company device, or both? -- The wide world of customer service and technical support -- Customer support in the mobile space - phone, chat, and text -- Customer support by phone -- Chat and texting solutions -- SMS text -- The Service Level Agreement (SLA) -- OS operators, manufacturers, and service providers -- Hardware -- Other device issues -- Operating system or user interface -- Application issues -- How to get the most out of your technical support experience if you have a malfunction -- Before you make the call - information, password problems, and your malfunction -- How to make the most of your time while on the line -- Answer every question -- Do not skip steps when describing your problem -- Test your device -- What to do if your malfunction has not been resolved -- Warranties in the mobile space -- Basic terms -- Navigating the web of warranties -- Summing it up -- Warranties -- Definitions -- Types of extended warranties -- Extended warranty coverage -- Extended warranty considerations -- To purchase an extended warranty or not? -- In a nutshell -- Summary -- 7. Baby Boomers, Teens, and Tweens -- The boom in baby boomers -- Colliding generations.
Speaking of the younger generation… -- Texting, sexting, and the Internet -- Strangers and dangers -- And unlimited damage -- Summary -- 8. Getting Your Life Back After You've Been Hacked -- Device profiles -- The Apple profile -- Apple backup -- The Android profile -- Android backup -- Have you been hacked? -- Knowing the difference - device hacks, profile hacks, or both -- In the event of a hack -- The device type (BYOD or the corporate device) -- BYOD -- Who to contact -- To wipe or not to wipe - partial or complete -- What to do and when to do it - a list in the event that you've been hacked -- Summing it up -- Summary -- A. IBM Notes Traveler -- The architectural design of the IBM Notes Traveler service -- Determining the correct deployment approach -- Review of the IBM Notes Traveler Server -- Overview of different clients -- Access to the IBM Notes Traveler Servers -- Communication to the devices -- Location of the IBM Notes Traveler Servers -- Location of the mail servers -- Connection methodologies to the Traveler servers -- Direct connection -- Reverse proxy -- IBM Mobile Connect -- VPN connection -- Establishing appropriate security settings -- Important review information -- Licensing information for IBM Notes Traveler -- B. Mobile Device Management -- Types of devices in the environment -- Consumer-focused devices -- Mobile information -- Messaging, calendar, and personal information management -- Collaboration and corporate applications -- Generally available applications -- Mobile security policies in the environment -- Corporate data and information -- Network/communications -- Devices -- Legal requirements and government regulations -- Determining the types of devices that will be supported -- Determine if a pure MDM solution is required in the environment -- Elements of device management -- Specific management of the device.
Leveraging MDM for application management -- Management of data on the device -- Access control -- Potential solutions -- Summary -- C. Tips to Help You Protect Your Mobile Device -- D. Mobile Acceptable Use Policy Template -- Mobile device acceptable use policy -- Overview -- Policy applicability -- Rules -- Disciplinary action -- Company owned devices -- Overview -- Rules for corporate devices -- Rules -- Disciplinary action -- Glossary -- Procedure to enable a device for corporate access -- E. The History of Social Networking, the Internet, and Smartphones -- The Internet -- Social networking -- Mobiles -- The difference between Android and iOS -- Let's not forget Windows -- Text messaging, chatting, and video chatting -- Index.
Summary: Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private.Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Ebrary Ebrary Afghanistan
Available EBKAF00082851
Ebrary Ebrary Algeria
Available
Ebrary Ebrary Cyprus
Available
Ebrary Ebrary Egypt
Available
Ebrary Ebrary Libya
Available
Ebrary Ebrary Morocco
Available
Ebrary Ebrary Nepal
Available EBKNP00082851
Ebrary Ebrary Sudan

Access a wide range of magazines and books using Pressreader and Ebook central.

Enjoy your reading, British Council Sudan.

Available
Ebrary Ebrary Tunisia
Available
Total holds: 0

Intro -- Mobile Security: How to Secure, Privatize, and Recover Your Devices -- Table of Contents -- Mobile Security: How to Secure, Privatize, and Recover Your Devices -- Credits -- Foreword -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Support files, eBooks, discount offers and more -- Why Subscribe? -- Free Access for Packt account holders -- Preface -- What this book covers -- What you need for this book -- Who this book is for -- Conventions -- Reader feedback -- Customer support -- Errata -- Piracy -- Questions -- 1. Living in a Mobile World -- The dangers of mobile computers -- A widespread lack of awareness -- Malware and viruses -- Understanding legitimate programs -- Precursors to the smartphone revolution - Internet, social-networking, and spam -- Social networking -- The two-way street of social networking -- 2012 is the new 1984 - how companies track us -- Facebook and customer tracking -- The new mobile world -- Making a smartphone smart -- The iPhone - why every phone secretly wants to be a smartphone -- The difference between Android and iOS -- Mobile purchasing and identification methods - who needs credit cards? -- CueCats and QR codes -- Mobile finance - buying and selling in the mobile marketplace -- The cloud -- The risks of cloud computing -- Summary -- 2. Users and Mobile Device Management -- Protecting the corporations -- Corporate security policies -- Corporate security procedures -- Frontend network protection -- Mobile and business -- Buying your device -- Mobile Device Management -- Does your company trust your device? -- Details of MDM -- MDM end user benefits and impacts -- Jailbreak and rooting -- Digital Rights Management -- MDM solutions and products -- Acceptable use policy (AUP) -- Power users -- Power user tools -- iPhone configuration tools -- Android configuration tools -- Configuration.

Simple tether configuration tool -- Simple router configuration -- Lookout -- Quick settings -- The hidden world (some advanced information) -- Summary -- 3. Privacy - Small Word, Big Consequences -- Troy and You -- Data good enough to steal -- Cookies, cookies everywhere -- They are watching you…and they know your name -- What's in it for the information thieves? -- Good idea, mixed results -- Reach out and touch -- Touch, but don't break -- And that's only the first part… -- Hidden "features -- The fallout -- Who has your data? Round 1… -- The truth is out there -- And now the rest of the story -- Who has your data? Round 2… -- Who has your data? Round 3… -- Who has your data? The final stretch… -- Your data in their hands -- Will your money be "too" mobile? -- Bring your mobile device to work day -- Steps you can take to protect yourself -- Summary -- 4. Mobile and Social - the Threats You Should Know About -- A prediction of the future (and the lottery numbers for next week) scams -- Malware -- Toll fraud -- SMS spoofing -- Social engineering -- Phishing -- Types of phishing -- Spear phishing -- How spear phishing works -- Other examples -- Receiving e-mails from a "friend -- Using your web presence against you -- Keeping your secrets secret -- Passwords that work -- Patches, updates, and security software -- Be vigilant -- Cloud computing security -- How it works -- The mobile user's security -- Cloud security -- Virus/worms/others -- Future threats -- Steps you can take to protect yourself -- Summing it up -- Summary -- 5. Protecting Your Mobile Devices -- Identifying your phone - the numbers that set your device apart -- Preventative measures - how to reduce the likelihood that your device will be hacked -- iPhone -- Android -- For any device -- Think twice before jailbreaking or rooting -- Safety in numbers - passwords and user IDs.

Using strong passwords -- Longer and varied passwords -- Changing passwords -- Data encryption -- Encryption on iOS -- Encryption on Android -- Downloaded applications -- Antivirus software on smartphones -- Verifying that an application is legitimate -- In the event that your device has been compromised -- Has your device been hacked? -- Social engineering -- Trojans and malware on your smartphone -- SMS messaging attacks -- Attacks through attachment and application downloads -- Compromised accounts -- Stolen or lost devices -- Wiping an iOS device -- Wiping an Android device -- Summing up -- Summary -- 6. Support and Warranty Insurance -- Toby's story -- The smartphone - a personal device, a company device, or both? -- The wide world of customer service and technical support -- Customer support in the mobile space - phone, chat, and text -- Customer support by phone -- Chat and texting solutions -- SMS text -- The Service Level Agreement (SLA) -- OS operators, manufacturers, and service providers -- Hardware -- Other device issues -- Operating system or user interface -- Application issues -- How to get the most out of your technical support experience if you have a malfunction -- Before you make the call - information, password problems, and your malfunction -- How to make the most of your time while on the line -- Answer every question -- Do not skip steps when describing your problem -- Test your device -- What to do if your malfunction has not been resolved -- Warranties in the mobile space -- Basic terms -- Navigating the web of warranties -- Summing it up -- Warranties -- Definitions -- Types of extended warranties -- Extended warranty coverage -- Extended warranty considerations -- To purchase an extended warranty or not? -- In a nutshell -- Summary -- 7. Baby Boomers, Teens, and Tweens -- The boom in baby boomers -- Colliding generations.

Speaking of the younger generation… -- Texting, sexting, and the Internet -- Strangers and dangers -- And unlimited damage -- Summary -- 8. Getting Your Life Back After You've Been Hacked -- Device profiles -- The Apple profile -- Apple backup -- The Android profile -- Android backup -- Have you been hacked? -- Knowing the difference - device hacks, profile hacks, or both -- In the event of a hack -- The device type (BYOD or the corporate device) -- BYOD -- Who to contact -- To wipe or not to wipe - partial or complete -- What to do and when to do it - a list in the event that you've been hacked -- Summing it up -- Summary -- A. IBM Notes Traveler -- The architectural design of the IBM Notes Traveler service -- Determining the correct deployment approach -- Review of the IBM Notes Traveler Server -- Overview of different clients -- Access to the IBM Notes Traveler Servers -- Communication to the devices -- Location of the IBM Notes Traveler Servers -- Location of the mail servers -- Connection methodologies to the Traveler servers -- Direct connection -- Reverse proxy -- IBM Mobile Connect -- VPN connection -- Establishing appropriate security settings -- Important review information -- Licensing information for IBM Notes Traveler -- B. Mobile Device Management -- Types of devices in the environment -- Consumer-focused devices -- Mobile information -- Messaging, calendar, and personal information management -- Collaboration and corporate applications -- Generally available applications -- Mobile security policies in the environment -- Corporate data and information -- Network/communications -- Devices -- Legal requirements and government regulations -- Determining the types of devices that will be supported -- Determine if a pure MDM solution is required in the environment -- Elements of device management -- Specific management of the device.

Leveraging MDM for application management -- Management of data on the device -- Access control -- Potential solutions -- Summary -- C. Tips to Help You Protect Your Mobile Device -- D. Mobile Acceptable Use Policy Template -- Mobile device acceptable use policy -- Overview -- Policy applicability -- Rules -- Disciplinary action -- Company owned devices -- Overview -- Rules for corporate devices -- Rules -- Disciplinary action -- Glossary -- Procedure to enable a device for corporate access -- E. The History of Social Networking, the Internet, and Smartphones -- The Internet -- Social networking -- Mobiles -- The difference between Android and iOS -- Let's not forget Windows -- Text messaging, chatting, and video chatting -- Index.

Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private.Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2019. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.