Security and Auditing of Smart Devices Managing Proliferation of Confidential Data on Corporate and BYOD Devices 1st edition by Sajay Rai, Philip Chukwuma, Richard Cozart – Ebook PDF Instant Download/Delivery: 1315352389, 9781315352381
Full download Security and Auditing of Smart Devices Managing Proliferation of Confidential Data on Corporate and BYOD Devices 1st edition after payment

Product details:
ISBN 10: 1315352389
ISBN 13: 9781315352381
Author: Sajay Rai, Philip Chukwuma, Richard Cozart
Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the IT organization but for the IT auditors as well. This book will serve as a guide to IT and Audit professionals on how to manage, secure and audit smart device. It provides guidance on the handling of corporate devices and the Bring Your Own Devices (BYOD) smart devices.
Security and Auditing of Smart Devices Managing Proliferation of Confidential Data on Corporate and BYOD Devices 1st Table of contents:
PART I: BENEFITS AND RISKS OF SMART DEVICES
CHAPTER 1: DEFINITION OF A SMART DEVICE
-
1.1 Introduction
-
1.2 Characteristics of a Smart Device
-
1.3 Definition of a Smart Device
CHAPTER 2: OWNERSHIP OF DEVICES
-
2.1 Corporate Owned versus Bring Your Own Device (BYOD) versus Company Owned, Personally Enabled (COPE)
-
2.1.1 Corporate-Owned Devices
-
2.1.2 BYOD
-
2.1.3 COPE
-
CHAPTER 3: DATA TYPES
-
3.1 Introduction
-
3.2 Email-Driven Era
-
3.3 Data on Smart Devices
-
3.3.1 Entertainment
-
3.3.2 Streaming
-
3.3.3 Office Work
-
3.3.4 Geolocation
-
3.3.5 Messages
-
3.3.6 Financial Information
-
-
3.4 The Age of the Internet of Things
-
3.4.1 Monitoring and Control
-
-
3.5 The Age of Corporate Connectivity
-
3.5.1 Network Connectivity
-
3.5.2 Physical Access Key Code
-
3.5.3 Employee Information
-
3.5.4 Customer and Business Partner Information
-
3.5.5 Product Information
-
-
3.6 The Age of Repositories
-
3.7 The Age of the Cloud
CHAPTER 4: USES AND BENEFITS OF SMART DEVICES
-
4.1 Introduction
-
4.2 Anywhere Communication
-
4.3 Entertainment
-
4.4 Financial Instrument
-
4.4.1 Apple Pay
-
4.4.2 Samsung Pay
-
4.4.3 Square Payment
-
-
4.5 New Education Format
-
4.6 Emergency Management
-
4.7 Mobile Healthcare
-
4.8 Location Information
CHAPTER 5: RISKS ASSOCIATED WITH THE USE OF SMART DEVICES
-
5.1 Introduction
-
5.2 Expansion of the Threat Surface
-
5.3 Data Loss due to Device Loss
-
5.4 Unintentional Disclosure of Data
-
5.5 Improper Disposal and Decommissioning of Device
-
5.6 Phishing Attacks
-
5.7 Spoofing Attacks
-
5.8 Malware Attacks
-
5.9 Spyware Attacks
-
5.10 Network Attacks
-
5.11 Encryption and Sensitive Data Protection
-
5.12 Litigation and Retention
-
5.13 Lack of User Awareness
PART II: SECURITY OF SMART DEVICES
CHAPTER 6: HARDWARE FEATURES
-
6.1 Introduction
-
6.2 Secure Boot Process
-
6.3 Cryptography
-
6.3.1 Apple iOS
-
6.3.2 Android
-
-
6.4 Near-Field Communication
-
6.5 Authentication by Biometric Verification
-
6.5.1 Apple Biometrics
-
6.5.2 Android Biometrics
-
CHAPTER 7: OPERATING SYSTEM SECURITY
-
7.1 Introduction
-
7.2 OS
-
7.2.1 Types of OS
-
-
7.3 Authentication
-
7.4 Application Security
-
7.5 Permissions
-
7.6 Application Sandbox
-
7.7 Network Services
-
7.7.1 iCloud
-
7.7.2 Android Device Manager
-
-
7.8 Jailbreaking/Rooting
CHAPTER 8: SECURING SMART DEVICES
-
8.1 Recommended Methodology
-
8.2 Other Considerations
PART III: MANAGING SMART DEVICES
CHAPTER 9: SMART DEVICE USE POLICY
-
9.1 Introduction
-
9.2 Smart Device Use Agreement
-
9.3 BYOD or Not?
-
9.4 Reimbursement of Smart Devices
-
9.5 Types of Supported OS
-
9.6 Other Considerations
CHAPTER 10: SECURITY POLICY
-
10.1 Introduction
-
10.2 Password Policy Control
-
10.3 Encryption
-
10.4 Port Control
-
10.5 Remote Lock/Unlock and Wipe
-
10.6 Asset Tracking
-
10.7 Device Configuration
-
10.8 Application Control and Proliferation
-
10.9 Blacklisting/Whitelisting
CHAPTER 11: MOBILE DEVICE MANAGEMENT
-
11.1 Introduction
-
11.2 Containerize or Noncontainerize?
-
11.3 MDM Features
-
11.3.1 Remote Wipe
-
11.3.2 Password Enforcement
-
11.3.3 Application Control
-
11.3.4 Jailbreak or Root Detection
-
11.3.5 Encryption
-
11.3.6 Other MDM Features
-
-
11.4 Microsoft EAS
-
11.5 Full MDM Solutions
CHAPTER 12: REGISTERING SMART DEVICES
-
12.1 Introduction
-
12.2 Enabling iOS Management
-
12.3 Enabling Android
-
12.3.1 Device Enrollment
-
12.3.2 MDM Administrator Access Authority
-
12.3.3 MDM Administrator Authority
-
CHAPTER 13: PROVISIONING EMAIL, CALENDAR, AND CONTACTS
-
13.1 Introduction
-
13.2 Email Access Using ActiveSync
-
13.3 Email Security Options within ActiveSync
CHAPTER 14: APPLICATION DEVELOPMENT AND DEPLOYMENT
-
14.1 Introduction
-
14.2 Smart Device App Considerations
-
14.3 Smart Device Applications
-
14.4 Smart Device Website
-
14.5 Application Development
-
14.6 Application Distribution
CHAPTER 15: CONNECTING TO CORPORATE NETWORK
-
15.1 Introduction
-
15.2 Dangers of Smart Devices to the Corporate Network
-
15.3 Connecting a Smart Device to a VPN
-
15.4 Apple iOS VPN Support
-
15.5 Android VPN Support
-
15.6 Types of VPN Available to Smart Devices
-
15.6.1 Always-On VPN
-
15.6.2 Per-User/Per-Profile VPN
-
15.6.3 Per-App VPN
-
15.6.4 VPN on Demand
-
-
15.7 Importance of VPN to Smart Device Usage
PART IV: COMPLIANCE
CHAPTER 16: COMPLIANCE
-
16.1 Introduction
-
16.2 HIPAA
-
16.3 Payment Card Industry Data Security Standards
-
16.4 Off-the-Shelf Payment Acceptance Solution
-
16.5 Build Your Own Payment Acceptance Solution
-
16.6 e-Discovery
-
16.7 Litigation Hold
-
16.8 Export Regulations
-
16.9 Compliance Challenges
PART V: REPORTING, MONITORING, AND AUDITING
CHAPTER 17: REPORTING, MONITORING, AND AUDITING
-
17.1 Introduction
-
17.2 Dashboard
-
17.3 Auditing
CHAPTER 18: SAMPLE AUDIT PLAN
PART VI: SAMPLES
INDEX
People also search for Security and Auditing of Smart Devices Managing Proliferation of Confidential Data on Corporate and BYOD Devices 1st :
security of smart devices
smart devices security risks
security and smart home
a security audit
a security audit requires
Tags:
Sajay Rai,Philip Chukwuma,Richard Cozart,Smart Devices,Confidential Data


