Cargando…

Mobile Access Safety : Beyond BYOD.

Over the last few years, mobile equipment to remotely connect to the corporate network (smartphones, ultra-light laptops, etc.) has rapidly grown. Future development perspectives and new tendencies such as BYOD (Bring your own device) expose more than ever business information system to various comp...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Assing, Dominique
Otros Autores: Cal?, St?phane
Formato: Electrónico eBook
Idioma:Inglés
Publicado: London : Wiley, 2013.
Colección:ISTE.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_ocn828299039
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 130223s2013 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d YDXCP  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d MERUC  |d ZCU  |d U3W  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCO  |d ICG  |d INT  |d OCLCQ  |d DKC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
020 |a 9781118577981 
020 |a 1118577981 
029 1 |a AU@  |b 000060069894 
029 1 |a DEBBG  |b BV044050037 
029 1 |a DEBSZ  |b 431338094 
029 1 |a DEBSZ  |b 449346633 
035 |a (OCoLC)828299039 
050 4 |a TK5102.85 .A384 2013 
082 0 4 |a 005.8  |a 621.384 
049 |a UAMI 
100 1 |a Assing, Dominique. 
245 1 0 |a Mobile Access Safety :  |b Beyond BYOD. 
260 |a London :  |b Wiley,  |c 2013. 
300 |a 1 online resource (248 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a ISTE 
588 0 |a Print version record. 
505 0 |a Title Page; Contents; Introduction; Chapter1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility; 1.1. A busy day; 1.2. The ups and downs of the day; 1.3. What actually happened?; Chapter 2. Threats and Attacks; 2.1. Reconnaissance phase; 2.1.1. Passive mode information gathering techniques; 2.1.2. Active mode information gathering techniques; 2.2. Identity/authentication attack; 2.2.1. ARP spoofing; 2.2.2. IP spoofing; 2.2.3. Connection hijacking; 2.2.4. Man in the middle; 2.2.5. DNS spoofing; 2.2.6. Replay attack; 2.2.7. Rebound intrusion. 
505 8 |a 2.2.8. Password hacking2.2.9. The insecurity of SSL/TLS; 2.3. Confidentiality attack; 2.3.1. Espionage software; 2.3.2. Trojans; 2.3.3. Sniffing; 2.3.4. Cracking encrypted data; 2.4. Availability attack; 2.4.1. ICMP Flood; 2.4.2. SYN Flood; 2.4.3. Smurfing; 2.4.4. Log Flood; 2.4.5. Worms; 2.5. Attack on software integrity; 2.6. BYOD: mixed-genre threats and attacks; 2.7. Interception of GSM/GPRS/EDGE communications; Chapter 3. Technological Countermeasures; 3.1. Prevention; 3.1.1. Protection of mobile equipment; 3.1.2. Data protection; 3.2. Detection; 3.2.1. Systems of intrusion detection. 
505 8 |a 3.2.2. Honeypot3.2.3. Management and supervision tools; 3.3. Reaction; 3.3.1. Firewall; 3.3.2. Reverse proxy; 3.3.3. Antivirus software; 3.3.4. Antivirus software: an essential building block but in need of completion; 3.4. Organizing the information system's security; 3.4.1. What is security organization?; 3.4.2. Quality of security, or the attraction of ISMS; Chapter 4. Technological Countermeasures for Remote Access; 4.1. Remote connection solutions; 4.1.1. Historic solutions; 4.1.2. Desktop sharing solutions; 4.1.3. Publication on the Internet. 
505 8 |a 4.1.4. Virtual Private Network (VPN) solutions4.2. Control of remote access; 4.2.1. Identification and authentication; 4.2.2. Unique authentication; 4.3. Architecture of remote access solutions; 4.3.1. Securing the infrastructure; 4.3.2. Load balancing/redundancy; 4.4. Control of conformity of the VPN infrastructure; 4.5. Control of network admission; 4.5.1. Control of network access; 4.5.2. ESCV (Endpoint Security Compliancy Verification); 4.5.3. Mobile NAC29; Chapter 5. What Should Have Been Done to Make Sure Mr Rowley's Day Really Was Ordinary; 5.1. The attack at Mr Rowley's house. 
505 8 |a 5.1.1. Securing Mr Rowley's PC5.1.2. Securing the organizational level; 5.1.3. Detection at the organizational level; 5.1.4. A little bit of prevention; 5.2. The attack at the airport VIP lounge while on the move; 5.3. The attack at the café; 5.4. The attack in the airport VIP lounge during Mr Rowley's return journey; 5.5. The loss of a smartphone and access to confidential data; 5.6. Summary of the different security solutions that should have been implemented; Conclusion; APPENDICES; Appendix 1; Appendix 2; Bibliography; Index. 
520 |a Over the last few years, mobile equipment to remotely connect to the corporate network (smartphones, ultra-light laptops, etc.) has rapidly grown. Future development perspectives and new tendencies such as BYOD (Bring your own device) expose more than ever business information system to various compromising threats. The safety control of remote accesses has become a strategic stake for all companies. This book reviews all the threats weighing on these remote accesses, as well as the existing standard and specific countermeasures to protect companies, from both the technical and organizational. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer networks  |x Remote access. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Accès à distance. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Remote access  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
700 1 |a Cal?, St?phane. 
758 |i has work:  |a Mobile access safety (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGx8xQM886wWq4FK8wWXcX  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Assing, Dominique.  |t Mobile Access Safety : Beyond BYOD.  |d London : Wiley, ©2013  |z 9781848214354 
830 0 |a ISTE. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1124007  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1124007 
938 |a YBP Library Services  |b YANK  |n 10196573 
994 |a 92  |b IZTAP