Preface |
|
xv | |
Authors |
|
xvii | |
|
Chapter 1 The Evolution of Data Communication Networks |
|
|
1 | (22) |
|
1.1 Emergence of Data Communication Network |
|
|
1 | (6) |
|
1.1.1 What Is Data Communication Network? |
|
|
2 | (1) |
|
1.1.2 Early Communication Networks |
|
|
3 | (3) |
|
1.1.3 Advent of Modern Data Communication |
|
|
6 | (1) |
|
1.2 Wired Data Communication Networks |
|
|
7 | (7) |
|
1.2.1 ARPA Communication Project |
|
|
9 | (1) |
|
1.2.2 Types of Data Network Topologies |
|
|
10 | (2) |
|
1.2.3 Major Data Communication Protocols |
|
|
12 | (2) |
|
1.3 Wireless Data Communication Networks |
|
|
14 | (9) |
|
1.3.1 What Is Wireless Communication Network? |
|
|
16 | (2) |
|
1.3.2 Types of Wireless Networks |
|
|
18 | (5) |
|
Chapter 2 History of Cellular Technology |
|
|
23 | (10) |
|
2.1 What Is Cellular Technology? |
|
|
23 | (1) |
|
2.2 Generations of Cellular Technologies |
|
|
24 | (5) |
|
2.3 Future Cellular Technologies |
|
|
29 | (4) |
|
Chapter 3 Role of Mobile Technology in Modern World |
|
|
33 | (14) |
|
3.1 Present Global Market of Mobile Technology |
|
|
33 | (3) |
|
3.2 Impact of Mobile Technology on Modern Business |
|
|
36 | (4) |
|
3.2.1 Mobile Friendly Web Presence |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
3.3 Impact of Mobile Technology on Daily Life |
|
|
40 | (3) |
|
3.4 Future Prospects of Mobile Technology |
|
|
43 | (4) |
|
Chapter 4 Mobile Security in Perspective |
|
|
47 | (20) |
|
4.1 What Is Mobile Security? |
|
|
47 | (5) |
|
|
49 | (1) |
|
4.1.2 Mobile Operating System |
|
|
49 | (1) |
|
4.1.3 Mobile Applications |
|
|
50 | (1) |
|
|
51 | (1) |
|
4.2 Enterprise Perspective of Mobile Security |
|
|
52 | (2) |
|
4.3 End User Perspective of Mobile Security |
|
|
54 | (2) |
|
4.4 Mobile Security Impact on Enterprises |
|
|
56 | (2) |
|
4.5 Mobile Security Impact on End Users |
|
|
58 | (1) |
|
4.6 Big Mobile Security Breaches and Their Impact |
|
|
58 | (4) |
|
4.6.1 Facebook Users' Email Password Breach |
|
|
58 | (1) |
|
4.6.2 German Celebrities' and Politicians' Personal Data Leakage |
|
|
59 | (1) |
|
4.6.3 Taiwan Semiconductor Manufacturing Company Ransom ware Attack |
|
|
60 | (1) |
|
4.6.4 Sixty Million LinkedIn Users' Personal Information Leakage |
|
|
60 | (1) |
|
4.6.5 Over 6.7 Million Indian Aadhaar Card Number Leakage |
|
|
61 | (1) |
|
4.6.6 Over 100 Million JustDial Users' Personal Information Leaked |
|
|
62 | (1) |
|
4.7 Future of Mobile Security |
|
|
62 | (5) |
|
Chapter 5 Working Principle of Major Wireless Networks |
|
|
67 | (22) |
|
5.1 Classification of Wireless Networks |
|
|
67 | (1) |
|
5.2 Wireless Wide Area Network |
|
|
68 | (8) |
|
5.2.1 Point-to-Point WWAN |
|
|
69 | (4) |
|
5.2.2 Switched Wireless Network or Cellular Network |
|
|
73 | (3) |
|
5.3 Wireless Metropolitan Area Network |
|
|
76 | (4) |
|
|
77 | (2) |
|
5.3.2 Long-Term Evolution |
|
|
79 | (1) |
|
5.4 Wireless Local Area Network |
|
|
80 | (3) |
|
|
81 | (1) |
|
5.4.2 Different Types of Wi-Fi |
|
|
82 | (1) |
|
5.5 Wireless Personal Area Network |
|
|
83 | (6) |
|
|
84 | (2) |
|
|
86 | (1) |
|
5.5.3 Near-Field Communication |
|
|
87 | (2) |
|
Chapter 6 Working Principle of Cellular Network |
|
|
89 | (16) |
|
6.1 Architecture of Cellular Network |
|
|
89 | (10) |
|
6.1.1 GSM Cellular Mobile Network |
|
|
90 | (1) |
|
6.1.2 CDMA 2000 IS-95 Cellular Mobile Network |
|
|
91 | (2) |
|
6.1.3 UMTS Cellular Mobile Network |
|
|
93 | (4) |
|
6.1.4 LTE Cellular Mobile Network |
|
|
97 | (2) |
|
6.2 Terminologies of Cellular Network |
|
|
99 | (4) |
|
|
100 | (1) |
|
|
100 | (1) |
|
|
100 | (1) |
|
6.2.4 Base Transceiver Station |
|
|
100 | (1) |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
6.3 Flow of a Cellular Data Connection |
|
|
103 | (2) |
|
Chapter 7 Types of Mobile Security Threats |
|
|
105 | (28) |
|
7.1 What Is a Mobile Security Threat? |
|
|
105 | (2) |
|
|
106 | (1) |
|
|
106 | (1) |
|
7.2 General Categories of Logical Mobile Security Threats |
|
|
107 | (4) |
|
7.2.1 Application-Level Mobile Security Threats |
|
|
107 | (2) |
|
7.2.2 Network-Level Mobile Security Threats |
|
|
109 | (1) |
|
7.2.3 Web-Level Mobile Security Threats |
|
|
110 | (1) |
|
7.3 Types of Mobile Security Threats |
|
|
111 | (19) |
|
|
112 | (1) |
|
|
112 | (2) |
|
|
114 | (1) |
|
|
115 | (3) |
|
|
118 | (1) |
|
7.3.6 Unsecure Wi-Fi Threats |
|
|
119 | (2) |
|
7.3.7 Data Leakage through Apps |
|
|
121 | (1) |
|
7.3.8 Broken Cryptography |
|
|
122 | (1) |
|
|
122 | (1) |
|
7.3.10 IoT Vulnerabilities |
|
|
123 | (1) |
|
7.3.11 Social Engineering Threat |
|
|
124 | (1) |
|
7.3.12 Out-of-Date Software |
|
|
124 | (1) |
|
7.3.13 Outdated Mobile Devices |
|
|
125 | (1) |
|
7.3.14 Mobile Crypto-Jacking |
|
|
126 | (1) |
|
7.3.15 Poor Password Management |
|
|
126 | (1) |
|
7.3.16 Physical Security of Device |
|
|
126 | (1) |
|
7.3.17 Unencrypted Communication |
|
|
127 | (1) |
|
7.3.18 Mobile Botnet Threat |
|
|
127 | (1) |
|
|
128 | (1) |
|
7.3.20 Man-in-the-Middle Threat |
|
|
128 | (1) |
|
7.3.21 Lack of Mobile Device Policy |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
129 | (1) |
|
7.4 Size of Mobile Security Threats |
|
|
130 | (1) |
|
7.5 Future Threats of Mobile Security |
|
|
130 | (3) |
|
Chapter 8 Mobile Security Threats in Internet-of-Things Ecosystem |
|
|
133 | (6) |
|
8.1 What Is Internet of Things? |
|
|
133 | (1) |
|
8.2 Security Vulnerabilities of IoT |
|
|
134 | (2) |
|
8.2.1 Major Attacks on IoT |
|
|
135 | (1) |
|
8.2.2 Major Security Threats against IoT Networks |
|
|
135 | (1) |
|
8.3 How to Minimize IoT Security Threats |
|
|
136 | (3) |
|
Chapter 9 How to Secure Your Mobile Devices |
|
|
139 | (16) |
|
9.1 Securing Your Mobile from Physical Threats |
|
|
139 | (5) |
|
9.1.1 Do Not Leave Mobile Devices Unattended |
|
|
140 | (1) |
|
9.1.2 Be Inconspicuous While Using Mobiles Outside |
|
|
141 | (1) |
|
9.1.3 Use a Physical Label on Your Device |
|
|
141 | (1) |
|
9.1.4 Note Down Complete Information of Your Mobile Device |
|
|
141 | (1) |
|
9.1.5 Install Mobile Anti-Theft or Remote Locking App |
|
|
142 | (1) |
|
9.1.6 Install Motion Detectors |
|
|
143 | (1) |
|
|
143 | (1) |
|
9.1.8 Useful Tips for Securing Your Phone from Physical Theft |
|
|
143 | (1) |
|
9.2 Securing Your Mobile from Cyber Threats |
|
|
144 | (11) |
|
9.2.1 Install Professional Antivirus Software |
|
|
144 | (1) |
|
9.2.2 Use Strong Passwords |
|
|
144 | (2) |
|
9.2.3 Avoid Free and Rogue Apps |
|
|
146 | (1) |
|
9.2.4 Update Operating Systems |
|
|
146 | (1) |
|
9.2.4.1 Updating Android Operating System |
|
|
147 | (1) |
|
9.2.4.2 Updating iOS Operating System |
|
|
148 | (1) |
|
9.2.4.3 Updating iPadOS Operating System |
|
|
148 | (1) |
|
9.2.4.4 Updating Windows Phone |
|
|
149 | (1) |
|
9.2.5 Update Applications Regularly |
|
|
149 | (1) |
|
9.2.6 Avoid Using Insecure Hotspots |
|
|
150 | (1) |
|
9.2.7 Backup Your Data Regularly |
|
|
151 | (1) |
|
9.2.8 Use Unlock Authentication |
|
|
151 | (1) |
|
9.2.9 Avoid Storing Personal/Financial Data on Mobiles |
|
|
152 | (1) |
|
9.2.10 Stay Informed and Updated |
|
|
153 | (2) |
|
Chapter 10 Mobile Password Management |
|
|
155 | (12) |
|
10.1 Importance of Strong Password |
|
|
155 | (2) |
|
10.2 What Types of Passwords Are in Use? |
|
|
157 | (1) |
|
10.3 Major Types of Password Hacking Attacks |
|
|
157 | (1) |
|
10.3.1 Brute Force Attacks |
|
|
158 | (1) |
|
|
158 | (1) |
|
10.3.3 Dictionary Attacks |
|
|
158 | (1) |
|
|
158 | (1) |
|
10.3.5 Trapping into Trust |
|
|
158 | (1) |
|
10.4 Useful Tips on Creating a Strong Password |
|
|
158 | (2) |
|
10.5 How to Create and Manage Secure Passwords |
|
|
160 | (1) |
|
10.6 Using Password Managers |
|
|
160 | (1) |
|
10.7 Top Five Password Managers for Mobile Devices |
|
|
161 | (6) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (3) |
|
Chapter 11 Securing Wireless Network Communication |
|
|
167 | (24) |
|
11.1 Service Provider Level Security |
|
|
167 | (5) |
|
11.1.1 User Premises Level Security |
|
|
168 | (1) |
|
11.1.2 Network Service Provider Level Security |
|
|
169 | (1) |
|
11.1.3 Cloud-Based Service Provider Level Security |
|
|
170 | (2) |
|
11.2 End-to-End Encryption |
|
|
172 | (2) |
|
11.3 Using Virtual Private Network |
|
|
174 | (5) |
|
|
176 | (1) |
|
|
177 | (1) |
|
11.3.3 Private Internet Access VPN |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
11.4 Implementi ng Access Control List |
|
|
179 | (1) |
|
11.5 Installing Firewall on Company's Local Network |
|
|
180 | (2) |
|
|
182 | (2) |
|
|
184 | (4) |
|
11.7.1 Bluetooth Security Modes |
|
|
186 | (1) |
|
11.7.2 Useful Tips to Secure Bluetooth Network |
|
|
187 | (1) |
|
11.8 Useful Tips on Securing Network Communication |
|
|
188 | (3) |
|
Chapter 12 Secure Shopping through Mobiles |
|
|
191 | (16) |
|
12.1 Importance of Online Shopping through Mobiles |
|
|
191 | (2) |
|
12.2 Why Online Shopping through Mobile Is Growing Fast? |
|
|
193 | (2) |
|
12.3 Challenges of Online Shopping Via Mobiles |
|
|
195 | (2) |
|
12.4 Ways of Online Shopping through Mobile |
|
|
197 | (4) |
|
12.4.1 Shopping through Browser |
|
|
197 | (2) |
|
12.4.2 Shopping through App |
|
|
199 | (2) |
|
12.4.3 Shopping through Mobile Phone Call |
|
|
201 | (1) |
|
12.5 How to Shop Securely through Mobile Apps |
|
|
201 | (2) |
|
12.6 How to Shop Securely through Mobile Browsers |
|
|
203 | (4) |
|
Chapter 13 World of Mobile Apps |
|
|
207 | (18) |
|
13.1 Introduction to Mobile Apps World |
|
|
207 | (2) |
|
13.1.1 Major Categories of Mobile Apps |
|
|
207 | (1) |
|
13.1.2 History of Mobile Apps |
|
|
208 | (1) |
|
13.2 Impact of Mobile Apps on Our Society |
|
|
209 | (2) |
|
13.3 Top Mobile App Stores |
|
|
211 | (7) |
|
|
212 | (2) |
|
|
214 | (1) |
|
13.3.3 Windows Phone Store |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
13.4 Threats Emanating around Mobile Apps |
|
|
218 | (3) |
|
13.5 Using Mobile Apps Securely |
|
|
221 | (4) |
|
13.5.1 Choosing the Right Mobile Application |
|
|
222 | (1) |
|
13.5.2 Useful Tips to Use Mobile Apps Securely |
|
|
222 | (3) |
|
Chapter 14 Mobile Wireless Technology and Security Standards |
|
|
225 | (30) |
|
14.1 Major Wireless Technology Standard Bodies |
|
|
225 | (8) |
|
14.1.1 Institute of Electrical and Electronics Engineers |
|
|
226 | (1) |
|
|
227 | (2) |
|
14.1.3 The Wi-Fi Alliance |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
230 | (1) |
|
14.1.6 European Telecommunications Standards Institute |
|
|
231 | (1) |
|
14.1.7 Telecommunication Industry Association |
|
|
232 | (1) |
|
14.2 Overview of Major Wireless Technology Standards |
|
|
233 | (6) |
|
14.2.1 Technology Standards in Terms of Generations |
|
|
233 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
236 | (1) |
|
14.2.2 Technology Standards in Terms of Area Coverage |
|
|
237 | (1) |
|
Wireless Wide Area Networks |
|
|
237 | (1) |
|
Wireless Local Area Networks |
|
|
237 | (1) |
|
Wireless Personal Area Network |
|
|
238 | (1) |
|
14.2.3 Technology Standards in Terms of Usage |
|
|
238 | (1) |
|
14.3 Data Communication-Related Mobile Security Standards |
|
|
239 | (16) |
|
14.3.1 Service Set Identifier |
|
|
239 | (1) |
|
14.3.2 MAC Address Filtering |
|
|
240 | (1) |
|
14.3.3 Wired Equivalent Privacy |
|
|
240 | (1) |
|
14.3.4 Wi-Fi Protected Access |
|
|
241 | (1) |
|
14.3.5 Wi-Fi Protected Access v2 |
|
|
241 | (1) |
|
14.3.6 Robust Security Network |
|
|
242 | (1) |
|
14.3.7 Advanced Encryption Standard |
|
|
243 | (1) |
|
14.3.8 Extensible Authentication Protocol |
|
|
244 | (1) |
|
14.3.9 Virtual Private Network Security |
|
|
244 | (11) |
Index |
|
255 | |