Mobile Computing: Securing your workforce
()
About this ebook
Related to Mobile Computing
Related ebooks
Complete Guide to Building an Information Security Program Rating: 0 out of 5 stars0 ratingsMobile Access Safety: Beyond BYOD Rating: 0 out of 5 stars0 ratingsSecurity 2020: Reduce Security Risks This Decade Rating: 0 out of 5 stars0 ratingsCyber Essentials: A guide to the Cyber Essentials and Cyber Essentials Plus certifications Rating: 0 out of 5 stars0 ratingsAndroid Programming: Pushing the Limits Rating: 0 out of 5 stars0 ratingsComprehensive Guide to Personal Cybersecurity: Personal Cybersecurity Practices for a Safer Digital Life Rating: 0 out of 5 stars0 ratingsBlind Spot: Smartphone and Computer Personal Security Guide Rating: 3 out of 5 stars3/5Network Security Bible Rating: 2 out of 5 stars2/5Cyber Defense in the Age of AI : AI vs. Cybersecurity Rating: 5 out of 5 stars5/5OSINT Hacker's Arsenal: Metagoofil, Theharvester, Mitaka, Builtwith Rating: 0 out of 5 stars0 ratingshacktivist: Hacker School Attacked Rating: 0 out of 5 stars0 ratingsYour System's Sweetspots: CEO's Advice on Basic Cyber Security: CEO's Advice on Computer Science Rating: 0 out of 5 stars0 ratingsCybersecurity Design Principles: Building Secure Resilient Architecture Rating: 0 out of 5 stars0 ratingsAmazon Echo: How to Get the Most Out of Your Amazon Echo: User Guide, Tips, Tricks & Commands (Revised, Expanded & Updated for 2016) Rating: 0 out of 5 stars0 ratingsPractical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities Rating: 0 out of 5 stars0 ratingsThe Antivirus Hacker's Handbook Rating: 0 out of 5 stars0 ratingsPrinciples of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601) Rating: 0 out of 5 stars0 ratingsCyber Curiosity: A Beginner's Guide to Cybersecurity Rating: 0 out of 5 stars0 ratingsThe Cybersecurity Maturity Model Certification (CMMC) – A pocket guide Rating: 0 out of 5 stars0 ratingsComputer Forensics JumpStart Rating: 3 out of 5 stars3/5Executive's Guide to Cyber Risk: Securing the Future Today Rating: 0 out of 5 stars0 ratingsSecurity in the Digital World Rating: 0 out of 5 stars0 ratingsImplementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines Rating: 0 out of 5 stars0 ratingsTales of Cybercrime and Other Cyber Tales Rating: 0 out of 5 stars0 ratingsCyber Protect Your Business Rating: 0 out of 5 stars0 ratingsCyber Security Consultants Playbook Rating: 0 out of 5 stars0 ratingsSecurity and Privacy in the Internet of Things: & Dark-web Investigation Rating: 0 out of 5 stars0 ratingsManaging the Human Factor in Information Security: How to win over staff and influence business managers Rating: 3 out of 5 stars3/5Artificial Intelligence for Cybersecurity: Develop AI approaches to solve cybersecurity problems in your organization Rating: 0 out of 5 stars0 ratingsAdvanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers Rating: 0 out of 5 stars0 ratings
Security For You
CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsTor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5CompTIA CySA+ Study Guide: Exam CS0-003 Rating: 2 out of 5 stars2/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHacking Point of Sale: Payment Application Secrets, Threats, and Solutions Rating: 5 out of 5 stars5/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5How Not To Use Your Smartphone Rating: 5 out of 5 stars5/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsCodes and Ciphers Rating: 5 out of 5 stars5/5Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security Rating: 0 out of 5 stars0 ratingsDark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Practice Tests: Exam SY0-601 Rating: 0 out of 5 stars0 ratingsHands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming Rating: 3 out of 5 stars3/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 4 out of 5 stars4/5CISM Certified Information Security Manager Study Guide Rating: 4 out of 5 stars4/5
Reviews for Mobile Computing
0 ratings0 reviews
Book preview
Mobile Computing - BCS, The Chartered Institute for IT
CONTENTS
Foreword
1 EQUIPPING EMPLOYEES, MAXIMISING POTENTIAL - Nathan Marke
2 CONSUMER DEVICES IN THE WORKPLACE: A BEST PRACTICE SECURITY APPROACH – Steve Durbin
3 SECURITY ON THE MOVE – Andrew Cormack
4 MOBILE SECURITY: MINIMISING RISK, MAXIMISING AWARENESS – Stuart Dommett
5 DELIVERING SECURITY ON EMPLOYEES’ PERSONAL LAPTOPS – Nick Lowe
6 SAFETY TRAINING FOR THE WORKFORCE – Sean Glynn
7 CEOs IN THE DOCK – Sean Glynn
8 STOPPING THE MOBILE BOT THREAT – Lannon Rowan
9 PASSWORD SECURITY – Derek Melber and Anna E. Ryberg
10 ENCRYPTION IS SOMETIMES NOT ENOUGH Luther Martin
11 NFC: ANOTHER ONE FOR THE ACRONYM SOUP Andrea Simmons
12 NETWORK SECURITY WHEN GOING MOBILE – Gord Boyce
13 IMPROVING YOUR NETWORK AND APPLICATION ASSURANCE STRATEGY – Paul Vlissidis
14 MOBILE RULES FOR SECURITY OFFICERS: A ‘CASE STUDY’ Jane Grafton
USEFUL RESOURCES
FOREWORD
It’s been less than three decades since the first commercial handheld cellular phone hit the market. Costing some $3,995 and likened to a brick, it immediately gained a long waiting list. Price and size have come down in the intervening years and popularity has soared. The technology has moved from analogue to digital and the handsets can now do so much more than make and receive voice telephone calls.
We’ve seen the introduction of short message service (SMS), multi-media message service (MMS), PDA functions (address book, calendar, notes), email, browsing (WAP through to modern browsers), full internet access and applications. Each new capability has opened up additional potential exposures for users.
Modern smartphones combine elements of mobile phone, personal digital assistants (PDA) and laptop into a small, easily lost or stolen, high-value device. With e-wallets, NFC, tablets and so on, as well as storing more and more confidential information as storage capacity grows, its value – and impact when lost – increases even more.
Phones are not the only devices we’re mobile with either. PDAs, laptops, tablets all add to the complexity, as does the growth in employees using their own devices and bringing them into the enterprise. Organisations need to cope, educate and secure.
Although manufacturers, operators, OS/application vendors and businesses try and control and/or secure their platforms, there are limits to what is technically possible and acceptable to users. Many people are no longer content with a device that cannot perform the functions or run the applications they see others use. Indeed, some will take exception to any level of control or security and ‘jailbreak’ or ‘unlock’ their devices so that they can run what they want on whatever network is available.
Whatever portable device you use, this ebook contains some useful advice to consider to help improve your mobile security.
Gareth Niblett
Chairman, BCS Information Security Specialist Group
1 EQUIPPING EMPLOYEES, MAXIMISING POTENTIAL
Nathan Marke, March 2011
Organisations are striving to implement supportive information and communications infrastructures to maximise employee collaboration, increase productivity and achieve efficiency savings. Equipping employees with the tools to work remotely and flexibly allows businesses to provide the best possible experience for their employees and customers whilst reducing overall IT spend, says Nathan Marke, 2e2’s Chief Technology Officer.
WHAT IS A ‘BETTER CONNECTED’ WORKFORCE?
The IT industry has tended to use terms such as ‘unified communications’ or ‘unified communications and collaboration’ to define the ways in which the modern workforce can work together and collaborate. These abbreviations are fine, save that they tend to create a focus on technology rather than on people or process; hardly surprising given that they originate from the technical hierarchy in our IT organisations.
By using the term ‘better connected workforce’ we seek to draw attention to the ways in which technology may be used to provide a better working environment, one in which employees may be able to communicate via different media that are appropriate to the particular purpose (instant messaging for the quick, informal query; video conferencing for the discussion that may be enhanced by some level of personal contact; telepresence for the more immersive group interaction). In short, the better connected workforce is one that is not only equipped with the right tools, but one that is aware of how these tools can be used to make communication between individuals, groups and across organisations faster, more effective and more productive. The better connected workforce is thus able to be more costeffective and better placed to attain the benefits, not only of new technology, but of new and more flexible working patterns and structures.
‘PROSUMERISATION’
This trend is accentuated by the effects of what is becoming known as consumerisation and ‘prosumerisation’. These buzz words refer to the blurring of distinctions between consumer products and professional products. For example, whilst the iPhone would fit into the former camp and the BlackBerry into the latter, each is being used in the other’s territory. A further example is the use of social networking products in the work environment (Twitter for marketing, Facebook for group updates etc.).
As a result employees now expect to be able to replicate the efficiency and ease of use of home apps in the workplace and to be able to move seamlessly from home to work without connecting to different systems. As business applications become ever more web-savvy and accessible via mobile browsers, we are starting to see a move in IT departments towards the allocation of per capita budgets, with employees being able to provide (and getting support for) whatever devices they choose. There is a risk that this trend creates a widening information gap between the ‘haves’ and ‘have nots’ (which is a challenge for all organisations and which mirrors a similar gap in society at large), but the momentum would seem to be unstoppable.
WHAT ARE THE BUSINESS DRIVERS?
There are a