|
Part I Benefits and Risks of Smart Devices |
|
|
|
Chapter 1 Definition of a Smart Device |
|
|
3 | (6) |
|
|
3 | (1) |
|
1.2 Characteristics of a Smart Device |
|
|
4 | (2) |
|
1.3 Definition of a Smart Device |
|
|
6 | (3) |
|
Chapter 2 Ownership of Devices |
|
|
9 | (10) |
|
2.1 Corporate Owned versus Bring Your Own Device versus Company Owned, Personally Enabled |
|
|
9 | (10) |
|
2.1.1 Corporate-Owned Devices |
|
|
10 | (3) |
|
|
13 | (4) |
|
|
17 | (2) |
|
|
19 | (14) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
20 | (5) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (2) |
|
|
24 | (1) |
|
3.3.6 Financial Information |
|
|
24 | (1) |
|
3.4 The Age of the Internet of Things |
|
|
25 | (1) |
|
3.4.1 Monitoring and Control |
|
|
26 | (1) |
|
3.5 The Age of Corporate Connectivity |
|
|
26 | (4) |
|
3.5.1 Network Connectivity |
|
|
27 | (1) |
|
3.5.2 Physical Access Key Code |
|
|
28 | (1) |
|
3.5.3 Employee Information |
|
|
28 | (1) |
|
3.5.4 Customer and Business Partner Information |
|
|
28 | (1) |
|
3.5.5 Product Information |
|
|
29 | (1) |
|
3.6 The Age of Repositories |
|
|
30 | (1) |
|
|
30 | (3) |
|
Chapter 4 Uses and Benefits of Smart Devices |
|
|
33 | (20) |
|
|
33 | (1) |
|
4.2 Anywhere Communication |
|
|
33 | (2) |
|
|
35 | (1) |
|
|
36 | (5) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
39 | (2) |
|
|
41 | (4) |
|
|
45 | (1) |
|
|
46 | (3) |
|
|
49 | (4) |
|
Chapter 5 Risks Associated with the Use of Smart Devices |
|
|
53 | (22) |
|
|
53 | (2) |
|
5.2 Expansion of the Threat Surface |
|
|
55 | (1) |
|
5.3 Data Loss due to Device Loss |
|
|
56 | (2) |
|
5.4 Unintentional Disclosure of Data |
|
|
58 | (1) |
|
5.5 Improper Disposal and Decommissioning of Device |
|
|
58 | (1) |
|
|
59 | (2) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
62 | (2) |
|
|
64 | (5) |
|
5.11 Encryption and Sensitive Data Protection |
|
|
69 | (1) |
|
5.12 Litigation and Retention |
|
|
69 | (1) |
|
5.13 Lack of User Awareness |
|
|
70 | (5) |
|
Part II Security of Smart Devices |
|
|
|
Chapter 6 Hardware Features |
|
|
75 | (10) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
76 | (3) |
|
|
77 | (1) |
|
|
78 | (1) |
|
6.4 Near-Field Communication |
|
|
79 | (2) |
|
6.5 Authentication by Biometric Verification |
|
|
81 | (4) |
|
|
81 | (1) |
|
|
82 | (3) |
|
Chapter 7 Operating System Security |
|
|
85 | (16) |
|
|
85 | (1) |
|
|
85 | (3) |
|
|
87 | (1) |
|
|
88 | (2) |
|
|
90 | (1) |
|
|
91 | (3) |
|
|
94 | (1) |
|
|
95 | (2) |
|
|
95 | (2) |
|
7.7.2 Android Device Manager |
|
|
97 | (1) |
|
|
97 | (4) |
|
Chapter 8 Securing Smart Devices |
|
|
101 | (8) |
|
8.1 Recommended Methodology |
|
|
101 | (5) |
|
|
106 | (3) |
|
Part III Managing Smart Devices |
|
|
|
Chapter 9 Smart Device Use Policy |
|
|
109 | (6) |
|
|
109 | (1) |
|
9.2 Smart Device Use Agreement |
|
|
109 | (2) |
|
|
111 | (1) |
|
9.4 Reimbursement of Smart Devices |
|
|
111 | (1) |
|
9.5 Types of Supported OS |
|
|
112 | (1) |
|
|
112 | (3) |
|
Chapter 10 Security Policy |
|
|
115 | (6) |
|
|
115 | (1) |
|
10.2 Password Policy Control |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
117 | (1) |
|
10.5 Remote Lock/Unlock and Wipe |
|
|
117 | (1) |
|
|
118 | (1) |
|
10.7 Device Configuration |
|
|
118 | (1) |
|
10.8 Application Control and Proliferation |
|
|
118 | (1) |
|
10.9 Blacklisting/Whitelisting |
|
|
119 | (2) |
|
Chapter 11 Mobile Device Management |
|
|
121 | (10) |
|
|
121 | (1) |
|
11.2 Containerize or Noncontainerize? |
|
|
122 | (1) |
|
|
123 | (2) |
|
|
123 | (1) |
|
11.3.2 Password Enforcement |
|
|
124 | (1) |
|
11.3.3 Application Control |
|
|
124 | (1) |
|
11.3.4 Jailbreak or Root Detection |
|
|
124 | (1) |
|
|
125 | (1) |
|
11.3.6 Other MDM Features |
|
|
125 | (1) |
|
|
125 | (2) |
|
|
127 | (4) |
|
Chapter 12 Registering Smart Devices |
|
|
131 | (12) |
|
|
131 | (1) |
|
12.2 Enabling iOS Management |
|
|
132 | (2) |
|
|
134 | (9) |
|
|
134 | (6) |
|
12.3.2 MDM Administrator Access Authority |
|
|
140 | (1) |
|
12.3.3 MDM Administrator Authority |
|
|
141 | (2) |
|
Chapter 13 Provisioning Email, Calendar, and Contacts |
|
|
143 | (10) |
|
|
143 | (1) |
|
13.2 Email Access Using ActiveSync |
|
|
144 | (1) |
|
13.3 Email Security Options within ActiveSync |
|
|
145 | (8) |
|
Chapter 14 Application Development and Deployment |
|
|
153 | (8) |
|
|
153 | (1) |
|
14.2 Smart Device App Considerations |
|
|
153 | (2) |
|
14.3 Smart Device Applications |
|
|
155 | (1) |
|
14.4 Smart Device Website |
|
|
156 | (2) |
|
14.5 Application Development |
|
|
158 | (1) |
|
14.6 Application Distribution |
|
|
158 | (3) |
|
Chapter 15 Connecting to Corporate Network |
|
|
161 | (10) |
|
|
161 | (1) |
|
15.2 Dangers of Smart Devices to the Corporate Network |
|
|
161 | (1) |
|
15.3 Connecting a Smart Device to a VPN |
|
|
162 | (1) |
|
15.4 Apple iOS VPN Support |
|
|
163 | (1) |
|
|
164 | (1) |
|
15.6 Types of VPN Available to Smart Devices |
|
|
165 | (3) |
|
|
165 | (1) |
|
15.6.2 Per-User/Per-Profile VPN |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
15.7 Importance of VPN to Smart Device Usage |
|
|
168 | (3) |
|
|
|
|
171 | (12) |
|
|
171 | (1) |
|
|
171 | (3) |
|
16.3 Payment Card Industry Data Security Standards |
|
|
174 | (1) |
|
16.4 Off-the-Shelf Payment Acceptance Solution |
|
|
175 | (1) |
|
16.5 Build Your Own Payment Acceptance Solution |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
16.9 Compliance Challenges |
|
|
179 | (4) |
|
Part V Reporting, Monitoring, and Auditing |
|
|
|
Chapter 17 Reporting, Monitoring, and Auditing |
|
|
183 | (2) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
Chapter 18 Sample Audit Plan |
|
|
185 | (14) |
|
|
Index |
|
199 | |