Muutke küpsiste eelistusi

E-raamat: Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices

(Securely Yours LLC, Bloomfield Hills, Michigan, USA), , (Securely Yours LLC, Bloomfield Hills, Michigan, USA)
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 50,69 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the IT organization but for the IT auditors as well. This book will serve as a guide to IT and Audit professionals on how to manage, secure and audit smart device. It provides guidance on the handling of corporate devices and the Bring Your Own Devices (BYOD) smart devices.

Part I Benefits and Risks of Smart Devices
Chapter 1 Definition of a Smart Device
3(6)
1.1 Introduction
3(1)
1.2 Characteristics of a Smart Device
4(2)
1.3 Definition of a Smart Device
6(3)
Chapter 2 Ownership of Devices
9(10)
2.1 Corporate Owned versus Bring Your Own Device versus Company Owned, Personally Enabled
9(10)
2.1.1 Corporate-Owned Devices
10(3)
2.1.2 BYOD
13(4)
2.1.3 COPE
17(2)
Chapter 3 Data Types
19(14)
3.1 Introduction
19(1)
3.2 Email-Driven Era
19(1)
3.3 Data on Smart Device
20(5)
3.3.1 Entertainment
20(1)
3.3.2 Streaming
21(1)
3.3.3 Office Work
21(1)
3.3.4 Geolocation
22(2)
3.3.5 Messages
24(1)
3.3.6 Financial Information
24(1)
3.4 The Age of the Internet of Things
25(1)
3.4.1 Monitoring and Control
26(1)
3.5 The Age of Corporate Connectivity
26(4)
3.5.1 Network Connectivity
27(1)
3.5.2 Physical Access Key Code
28(1)
3.5.3 Employee Information
28(1)
3.5.4 Customer and Business Partner Information
28(1)
3.5.5 Product Information
29(1)
3.6 The Age of Repositories
30(1)
3.7 The Age of the Cloud
30(3)
Chapter 4 Uses and Benefits of Smart Devices
33(20)
4.1 Introduction
33(1)
4.2 Anywhere Communication
33(2)
4.3 Entertainment
35(1)
4.4 Financial Instrument
36(5)
4.4.1 Apple Pay
37(1)
4.4.2 Samsung Pay
38(1)
4.4.3 Square Payment
39(2)
4.5 New Education Format
41(4)
4.6 Emergency Management
45(1)
4.7 Mobile Healthcare
46(3)
4.8 Location Information
49(4)
Chapter 5 Risks Associated with the Use of Smart Devices
53(22)
5.1 Introduction
53(2)
5.2 Expansion of the Threat Surface
55(1)
5.3 Data Loss due to Device Loss
56(2)
5.4 Unintentional Disclosure of Data
58(1)
5.5 Improper Disposal and Decommissioning of Device
58(1)
5.6 Phishing Attacks
59(2)
5.7 Spoofing Attacks
61(1)
5.8 Malware Attacks
62(1)
5.9 Spyware Attacks
62(2)
5.10 Network Attacks
64(5)
5.11 Encryption and Sensitive Data Protection
69(1)
5.12 Litigation and Retention
69(1)
5.13 Lack of User Awareness
70(5)
Part II Security of Smart Devices
Chapter 6 Hardware Features
75(10)
6.1 Introduction
75(1)
6.2 Secure Boot Process
75(1)
6.3 Cryptography
76(3)
6.3.1 Apple iOS
77(1)
6.3.2 Android
78(1)
6.4 Near-Field Communication
79(2)
6.5 Authentication by Biometric Verification
81(4)
6.5.1 Apple Biometrics
81(1)
6.5.2 Android Biometrics
82(3)
Chapter 7 Operating System Security
85(16)
7.1 Introduction
85(1)
7.2 OS
85(3)
7.2.1 Types of OS
87(1)
7.3 Authentication
88(2)
7.4 Application Security
90(1)
7.5 Permissions
91(3)
7.6 Application Sandbox
94(1)
7.7 Network Services
95(2)
7.7.1 iCloud
95(2)
7.7.2 Android Device Manager
97(1)
7.8 Jailbreaking/Rooting
97(4)
Chapter 8 Securing Smart Devices
101(8)
8.1 Recommended Methodology
101(5)
8.2 Other Considerations
106(3)
Part III Managing Smart Devices
Chapter 9 Smart Device Use Policy
109(6)
9.1 Introduction
109(1)
9.2 Smart Device Use Agreement
109(2)
9.3 BYOD or Not?
111(1)
9.4 Reimbursement of Smart Devices
111(1)
9.5 Types of Supported OS
112(1)
9.6 Other Considerations
112(3)
Chapter 10 Security Policy
115(6)
10.1 Introduction
115(1)
10.2 Password Policy Control
116(1)
10.3 Encryption
116(1)
10.4 Port Control
117(1)
10.5 Remote Lock/Unlock and Wipe
117(1)
10.6 Asset Tracking
118(1)
10.7 Device Configuration
118(1)
10.8 Application Control and Proliferation
118(1)
10.9 Blacklisting/Whitelisting
119(2)
Chapter 11 Mobile Device Management
121(10)
11.1 Introduction
121(1)
11.2 Containerize or Noncontainerize?
122(1)
11.3 MDM Features
123(2)
11.3.1 Remote Wipe
123(1)
11.3.2 Password Enforcement
124(1)
11.3.3 Application Control
124(1)
11.3.4 Jailbreak or Root Detection
124(1)
11.3.5 Encryption
125(1)
11.3.6 Other MDM Features
125(1)
11.4 Microsoft EAS
125(2)
11.5 Full MDM Solutions
127(4)
Chapter 12 Registering Smart Devices
131(12)
12.1 Introduction
131(1)
12.2 Enabling iOS Management
132(2)
12.3 Enabling Android
134(9)
12.3.1 Device Enrollment
134(6)
12.3.2 MDM Administrator Access Authority
140(1)
12.3.3 MDM Administrator Authority
141(2)
Chapter 13 Provisioning Email, Calendar, and Contacts
143(10)
13.1 Introduction
143(1)
13.2 Email Access Using ActiveSync
144(1)
13.3 Email Security Options within ActiveSync
145(8)
Chapter 14 Application Development and Deployment
153(8)
14.1 Introduction
153(1)
14.2 Smart Device App Considerations
153(2)
14.3 Smart Device Applications
155(1)
14.4 Smart Device Website
156(2)
14.5 Application Development
158(1)
14.6 Application Distribution
158(3)
Chapter 15 Connecting to Corporate Network
161(10)
15.1 Introduction
161(1)
15.2 Dangers of Smart Devices to the Corporate Network
161(1)
15.3 Connecting a Smart Device to a VPN
162(1)
15.4 Apple iOS VPN Support
163(1)
15.5 Android VPN Support
164(1)
15.6 Types of VPN Available to Smart Devices
165(3)
15.6.1 Always-On VPN
165(1)
15.6.2 Per-User/Per-Profile VPN
166(1)
15.6.3 Per-App VPN
167(1)
15.6.4 VPN on Demand
167(1)
15.7 Importance of VPN to Smart Device Usage
168(3)
Part IV Compliance
Chapter 16 Compliance
171(12)
16.1 Introduction
171(1)
16.2 HIPAA
171(3)
16.3 Payment Card Industry Data Security Standards
174(1)
16.4 Off-the-Shelf Payment Acceptance Solution
175(1)
16.5 Build Your Own Payment Acceptance Solution
176(1)
16.6 e-Discovery
177(1)
16.7 Litigation Hold
178(1)
16.8 Export Regulations
178(1)
16.9 Compliance Challenges
179(4)
Part V Reporting, Monitoring, and Auditing
Chapter 17 Reporting, Monitoring, and Auditing
183(2)
17.1 Introduction
183(1)
17.2 Dashboard
183(1)
17.3 Auditing
184(1)
Chapter 18 Sample Audit Plan
185(14)
Part VI Samples
Index 199
Sajay Rai has more than 30 years of experience in information technology, specializing in information technology processes, IT architecture, security, business continuity, disaster recovery, privacy, IT audit and information risk. Mr. Rai is the Founder and CEO of Securely Yours LLC, which is focused on delivering innovative solutions through delivery channels like Software-as-a-Service, Managed Services and traditional IT consulting.



Prior to starting Securely Yours LLC, Mr. Rai was a Partner with Ernst & Young LLP for 10 years and was responsible for the information advisory practice in the Detroit Metro area. He also served as the national leader of EYs Information Security and Business Continuity practices. Mr. Rais clients included General Motors, Blue Cross Blue Shield of Michigan, Yazaki North America, Tecumseh and Federal Mogul. He also served as a member of his firms Partners Advisory Council.



Mr. Rai also worked with IBM for 13 years, most recently serving as an executive of the national Business Continuity and Contingency consulting practice. He was instrumental in starting the companys Information Security consulting practice and managing its information technology consulting practice in Latin America. Mr. Rai co-authored Defending the Digital Frontier: A Security Agenda, which guides business and IT executives on how to develop an effective and efficient information security program within their enterprise. He also co-authored Institute of Internal Auditors publications of "Sawyers Internal Audit Handbook 6th Edition" and the publication of IIAs Global Technology Audit Guide (GTAG) No. 9 on the topic of Identity and Access Management.



Mr. Rai is a member of IIAs Professional Issues Committee (PIC). He also serves on the board of ISACA Detroit Chapter, IIAs Detroit Chapter, Society of Information Management (SIM) Detroit Chapter and as a member of Walsh Colleges Accounting Advisory and Technology Committees. Mr. Rai is a regular speaker at industry conferences on information security, business continuity, disaster recovery, technology strategy and is frequently quoted in magazines and newspapers. He has also served as expert witness in litigation cases in the area of information technology and information security.



He holds a Masters degree in Information Management from Washington University of St. Louis, and a Bachelors degree in Computer Science from Fontbonne College of St. Louis.