You are previewing Mobile Security: How to Secure, Privatize, and Recover Your Devices.
O'Reilly logo
Mobile Security: How to Secure, Privatize, and Recover Your Devices

Book Description

Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.

  • Learn how mobile devices are monitored and the impact of cloud computing

  • Understand the attacks hackers use and how to prevent them

  • Keep yourself and your loved ones safe online

  • In Detail

    The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your personal information dangerously exposed. Your online safety is at risk and the threat of information being stolen from your device is at an all- time high. Your identity is yours, yet it can be compromised if you don’t manage your phone or mobile device correctly.

    Gain the power to manage all your mobile devices safely. With the help of this guide you can ensure that your data and that of your family is safe. The threat to your mobile security is growing on a daily basis and this guide may just be the help you need.

    Mobile Security: How to secure, privatize and recover your devices will teach you how to recognize, protect against, and recover from hacking attempts and outline the clear and present threats to your online identity posed by the use of a mobile device.

    In this guide you will discover just how vulnerable unsecured devices can be, and explore effective methods of mobile device management and identity protection to ensure your data's security. There will be special sections detailing extra precautions to ensure the safety of family members and how to secure your device for use at work.

    Table of Contents

    1. Mobile Security: How to Secure, Privatize, and Recover Your Devices
      1. Table of Contents
      2. Mobile Security: How to Secure, Privatize, and Recover Your Devices
      3. Credits
      4. Foreword
      5. About the Authors
      6. About the Reviewers
        1. Support files, eBooks, discount offers and more
          1. Why Subscribe?
          2. Free Access for Packt account holders
      8. Preface
        1. What this book covers
        2. What you need for this book
        3. Who this book is for
        4. Conventions
        5. Reader feedback
        6. Customer support
          1. Errata
          2. Piracy
          3. Questions
      9. 1. Living in a Mobile World
        1. The dangers of mobile computers
          1. A widespread lack of awareness
            1. Malware and viruses
            2. Understanding legitimate programs
        2. Precursors to the smartphone revolution – Internet, social-networking, and spam
          1. Social networking
            1. The two-way street of social networking
          2. 2012 is the new 1984 – how companies track us
            1. Facebook and customer tracking
        3. The new mobile world
          1. Making a smartphone smart
          2. The iPhone – why every phone secretly wants to be a smartphone
          3. The difference between Android and iOS
        4. Mobile purchasing and identification methods – who needs credit cards?
          1. CueCats and QR codes
          2. Mobile finance – buying and selling in the mobile marketplace
        5. The cloud
          1. The risks of cloud computing
        6. Summary
      10. 2. Users and Mobile Device Management
        1. Protecting the corporations
          1. Corporate security policies
          2. Corporate security procedures
          3. Frontend network protection
        2. Mobile and business
        3. Buying your device
        4. Mobile Device Management
          1. Does your company trust your device?
          2. Details of MDM
            1. MDM end user benefits and impacts
            2. Jailbreak and rooting
              1. Digital Rights Management
          3. MDM solutions and products
        5. Acceptable use policy (AUP)
          1. Power users
          2. Power user tools
            1. iPhone configuration tools
            2. Android configuration tools
              1. Configuration
              2. Simple tether configuration tool
              3. Simple router configuration
              4. Lookout
              5. Quick settings
            3. The hidden world (some advanced information)
        6. Summary
      11. 3. Privacy – Small Word, Big Consequences
        1. Troy and You
        2. Data good enough to steal
          1. Cookies, cookies everywhere
          2. They are watching you…and they know your name
          3. What's in it for the information thieves?
        3. Good idea, mixed results
          1. Reach out and touch
          2. Touch, but don't break
        4. And that's only the first part…
          1. Hidden "features"
          2. The fallout
        5. Who has your data? Round 1…
          1. The truth is out there
          2. And now the rest of the story
        6. Who has your data? Round 2…
        7. Who has your data? Round 3…
        8. Who has your data? The final stretch…
        9. Your data in their hands
        10. Will your money be "too" mobile?
        11. Bring your mobile device to work day
        12. Steps you can take to protect yourself
        13. Summary
      12. 4. Mobile and Social – the Threats You Should Know About
        1. A prediction of the future (and the lottery numbers for next week) scams
          1. Malware
            1. Toll fraud
            2. SMS spoofing
        2. Social engineering
          1. Phishing
            1. Types of phishing
          2. Spear phishing
            1. How spear phishing works
            2. Other examples
              1. Receiving e-mails from a "friend"
              2. Using your web presence against you
              3. Keeping your secrets secret
              4. Passwords that work
              5. Patches, updates, and security software
              6. Be vigilant
              7. Cloud computing security
            3. How it works
            4. The mobile user's security
              1. Cloud security
        3. Virus/worms/others
        4. Future threats
        5. Steps you can take to protect yourself
        6. Summing it up
        7. Summary
      13. 5. Protecting Your Mobile Devices
        1. Identifying your phone – the numbers that set your device apart
        2. Preventative measures – how to reduce the likelihood that your device will be hacked
          1. iPhone
          2. Android
          3. For any device
          4. Think twice before jailbreaking or rooting
          5. Safety in numbers – passwords and user IDs
            1. Using strong passwords
            2. Longer and varied passwords
            3. Changing passwords
          6. Data encryption
            1. Encryption on iOS
            2. Encryption on Android
          7. Downloaded applications
            1. Antivirus software on smartphones
            2. Verifying that an application is legitimate
        3. In the event that your device has been compromised
          1. Has your device been hacked?
            1. Social engineering
          2. Trojans and malware on your smartphone
            1. SMS messaging attacks
            2. Attacks through attachment and application downloads
          3. Compromised accounts
          4. Stolen or lost devices
            1. Wiping an iOS device
            2. Wiping an Android device
        4. Summing up
        5. Summary
      14. 6. Support and Warranty Insurance
        1. Toby's story
        2. The smartphone – a personal device, a company device, or both?
        3. The wide world of customer service and technical support
          1. Customer support in the mobile space – phone, chat, and text
          2. Customer support by phone
          3. Chat and texting solutions
            1. SMS text
          4. The Service Level Agreement (SLA)
        4. OS operators, manufacturers, and service providers
          1. Hardware
            1. Other device issues
          2. Operating system or user interface
          3. Application issues
        5. How to get the most out of your technical support experience if you have a malfunction
          1. Before you make the call – information, password problems, and your malfunction
          2. How to make the most of your time while on the line
            1. Answer every question
            2. Do not skip steps when describing your problem
            3. Test your device
          3. What to do if your malfunction has not been resolved
        6. Warranties in the mobile space
          1. Basic terms
          2. Navigating the web of warranties
          3. Summing it up
        7. Warranties
          1. Definitions
          2. Types of extended warranties
          3. Extended warranty coverage
          4. Extended warranty considerations
          5. To purchase an extended warranty or not?
        8. In a nutshell
        9. Summary
      15. 7. Baby Boomers, Teens, and Tweens
        1. The boom in baby boomers
        2. Colliding generations
        3. Speaking of the younger generation…
          1. Texting, sexting, and the Internet
          2. Strangers and dangers
          3. And unlimited damage
        4. Summary
      16. 8. Getting Your Life Back After You've Been Hacked
        1. Device profiles
          1. The Apple profile
          2. Apple backup
          3. The Android profile
          4. Android backup
        2. Have you been hacked?
          1. Knowing the difference – device hacks, profile hacks, or both
        3. In the event of a hack
          1. The device type (BYOD or the corporate device)
          2. BYOD
          3. Who to contact
            1. To wipe or not to wipe – partial or complete
          4. What to do and when to do it – a list in the event that you've been hacked
        4. Summing it up
        5. Summary
      17. A. IBM Notes Traveler
        1. The architectural design of the IBM Notes Traveler service
          1. Determining the correct deployment approach
          2. Review of the IBM Notes Traveler Server
        2. Overview of different clients
          1. Access to the IBM Notes Traveler Servers
          2. Communication to the devices
          3. Location of the IBM Notes Traveler Servers
          4. Location of the mail servers
          5. Connection methodologies to the Traveler servers
          6. Direct connection
          7. Reverse proxy
          8. IBM Mobile Connect
          9. VPN connection
          10. Establishing appropriate security settings
        3. Important review information
          1. Licensing information for IBM Notes Traveler
      18. B. Mobile Device Management
        1. Types of devices in the environment
          1. Consumer-focused devices
          2. Mobile information
          3. Messaging, calendar, and personal information management
          4. Collaboration and corporate applications
          5. Generally available applications
        2. Mobile security policies in the environment
          1. Corporate data and information
          2. Network/communications
          3. Devices
          4. Legal requirements and government regulations
          5. Determining the types of devices that will be supported
          6. Determine if a pure MDM solution is required in the environment
          7. Elements of device management
            1. Specific management of the device
            2. Leveraging MDM for application management
            3. Management of data on the device
          8. Access control
          9. Potential solutions
        3. Summary
      19. C. Tips to Help You Protect Your Mobile Device
      20. D. Mobile Acceptable Use Policy Template
        1. Mobile device acceptable use policy
          1. Overview
          2. Policy applicability
            1. Rules
              1. Disciplinary action
          3. Company owned devices
            1. Overview
            2. Rules for corporate devices
              1. Rules
              2. Disciplinary action
        2. Glossary
          1. Procedure to enable a device for corporate access
      21. E. The History of Social Networking, the Internet, and Smartphones
        1. The Internet
          1. Social networking
          2. Mobiles
          3. The difference between Android and iOS
          4. Let's not forget Windows
          5. Text messaging, chatting, and video chatting
      22. Index