LEADER 05393nam 2200673 a 450 001 9910138859303321 005 20230803020322.0 010 $a1-118-57788-4 010 $a1-118-57798-1 010 $a1-118-57781-7 010 $a1-299-18667-X 035 $a(CKB)2550000001005868 035 $a(EBL)1124007 035 $a(OCoLC)828299039 035 $a(SSID)ssj0000855368 035 $a(PQKBManifestationID)11478847 035 $a(PQKBTitleCode)TC0000855368 035 $a(PQKBWorkID)10929828 035 $a(PQKB)11143089 035 $a(MiAaPQ)EBC1124007 035 $a(Au-PeEL)EBL1124007 035 $a(CaPaEBR)ebr10658477 035 $a(CaONFJC)MIL449917 035 $a(EXLCZ)992550000001005868 100 $a20121012d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aMobile access safety$b[electronic resource] $ebeyond BYOD /$fDominique Assing, Ste?phane Cale? 210 $aHoboken, N.J. $cISTE Ltd./John Wiley and Sons Inc.$d2013 215 $a1 online resource (248 p.) 225 0$aNetworks and telecommunications series 300 $aDescription based upon print version of record. 311 $a1-84821-435-9 320 $aIncludes bibliographical references and index. 327 $aTitle Page; Contents; Introduction; Chapter1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility; 1.1. A busy day; 1.2. The ups and downs of the day; 1.3. What actually happened?; Chapter 2. Threats and Attacks; 2.1. Reconnaissance phase; 2.1.1. Passive mode information gathering techniques; 2.1.2. Active mode information gathering techniques; 2.2. Identity/authentication attack; 2.2.1. ARP spoofing; 2.2.2. IP spoofing; 2.2.3. Connection hijacking; 2.2.4. Man in the middle; 2.2.5. DNS spoofing; 2.2.6. Replay attack; 2.2.7. Rebound intrusion 327 $a2.2.8. Password hacking2.2.9. The insecurity of SSL/TLS; 2.3. Confidentiality attack; 2.3.1. Espionage software; 2.3.2. Trojans; 2.3.3. Sniffing; 2.3.4. Cracking encrypted data; 2.4. Availability attack; 2.4.1. ICMP Flood; 2.4.2. SYN Flood; 2.4.3. Smurfing; 2.4.4. Log Flood; 2.4.5. Worms; 2.5. Attack on software integrity; 2.6. BYOD: mixed-genre threats and attacks; 2.7. Interception of GSM/GPRS/EDGE communications; Chapter 3. Technological Countermeasures; 3.1. Prevention; 3.1.1. Protection of mobile equipment; 3.1.2. Data protection; 3.2. Detection; 3.2.1. Systems of intrusion detection 327 $a3.2.2. Honeypot3.2.3. Management and supervision tools; 3.3. Reaction; 3.3.1. Firewall; 3.3.2. Reverse proxy; 3.3.3. Antivirus software; 3.3.4. Antivirus software: an essential building block but in need of completion; 3.4. Organizing the information system's security; 3.4.1. What is security organization?; 3.4.2. Quality of security, or the attraction of ISMS; Chapter 4. Technological Countermeasures for Remote Access; 4.1. Remote connection solutions; 4.1.1. Historic solutions; 4.1.2. Desktop sharing solutions; 4.1.3. Publication on the Internet 327 $a4.1.4. Virtual Private Network (VPN) solutions4.2. Control of remote access; 4.2.1. Identification and authentication; 4.2.2. Unique authentication; 4.3. Architecture of remote access solutions; 4.3.1. Securing the infrastructure; 4.3.2. Load balancing/redundancy; 4.4. Control of conformity of the VPN infrastructure; 4.5. Control of network admission; 4.5.1. Control of network access; 4.5.2. ESCV (Endpoint Security Compliancy Verification); 4.5.3. Mobile NAC29; Chapter 5. What Should Have Been Done to Make Sure Mr Rowley's Day Really Was Ordinary; 5.1. The attack at Mr Rowley's house 327 $a5.1.1. Securing Mr Rowley's PC5.1.2. Securing the organizational level; 5.1.3. Detection at the organizational level; 5.1.4. A little bit of prevention; 5.2. The attack at the airport VIP lounge while on the move; 5.3. The attack at the cafe?; 5.4. The attack in the airport VIP lounge during Mr Rowley's return journey; 5.5. The loss of a smartphone and access to confidential data; 5.6. Summary of the different security solutions that should have been implemented; Conclusion; APPENDICES; Appendix 1; Appendix 2; Bibliography; Index 330 $a Over recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones, laptops, etc.) has increased rapidly. Innovative development perspectives and new tendencies such as BYOD (bring your own device) are exposing business information systems more than ever to various compromising threats. The safety control of remote access has become a strategic issue for all companies. This book reviews all the threats weighing on these remote access points, as well as the existing standards and specific countermeasures to protect companies, from both th 410 0$aISTE 606 $aComputer networks$xRemote access 606 $aComputer networks$xSecurity measures 615 0$aComputer networks$xRemote access. 615 0$aComputer networks$xSecurity measures. 676 $a005.8 676 $a621.384 700 $aAssing$b Dominique$0960779 701 $aCale?$b Ste?phane$0960780 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910138859303321 996 $aMobile access safety$92178027 997 $aUNINA