Pub. Date:
Elsevier Science
Mobile Data Loss: Threats and Countermeasures

Mobile Data Loss: Threats and Countermeasures

by Michael T. RaggoMichael T. Raggo
Current price is , Original price is $29.95. You

Temporarily Out of Stock Online

Please check back later for updated availability.


The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors.

  • Outlines differences in mobile devices versus PCs
  • Reviews mobile threat landscape using a hacker mind-set to outline risks and attack vectors
  • Summarizes the tools and techniques for implementing enterprise countermeasures
  • Maps mobile to common security compliances including PCI, HIPAA, and CJIS
  • Provides a defense-in-depth methodology and strategy for enterprises to minimize data loss

Product Details

ISBN-13: 9780128028643
Publisher: Elsevier Science
Publication date: 12/30/2015
Pages: 54
Product dimensions: 5.80(w) x 8.80(h) x 0.30(d)

About the Author

Michael Raggo (CISSP, NSA-IAM, ACE, CSI) has over 20 years of security research experience. His current focus is threats and countermeasures for the mobile enterprise. Michael is the author of “Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols” for Syngress Books. A former security trainer, Michael has briefed international defense agencies including the FBI and Pentagon, is a participating member of the PCI Mobile Task Force, and is a frequent presenter at security conferences, including Black Hat, DEF CON, DoD Cyber Crime, InfoSec, SANS, and OWASP.

Table of Contents

Acknowledgments ix

Chapter 1 Preparing for Generation Mobile 1

Introduction 1

The Problem 2

What's Different about Mobile? 3

Secrets to Mobile Data Loss Prevention Success 4

Summary 6

Chapter 2 Understanding Mobile Data Loss Threats 7

Mobile Threat Vectors 7

Mobile OS Compromise 7

Malware and Risky Apps 9

User Data Loss 12

Mobile Network Threats 13

Summary 16

Chapter 3 Mobile Security Countermeasures 17

Mobile OS Compromise 17

Malware and Risky Apps 19

Access Control and Conditional Access 20

Lockdowns and Restrictions 22

Live Monitoring, Audit Logs, Events, and Reporting 22

Incident Response and Forensics 23

Mobile Device Updates and Patching 24

Wearables 24

Device Encryption and Containers 25

PINs, Passwords, and Passcodes 26

Cloud 27

File-Level Security 27

Summary 28

Chapter 4 Ensuring Mobile Compliance 29

PCI 29



Summary 35

Chapter 5 Developing Your Mobile Device Security Strategy 37

Proactive Controls 37

Reactive Controls and Protections 38

Mobile Data Loss Threats and Countermeasures Flow 41

Mobile DLP Methodology 42

Futures 43

Mobile Security Requires a New Approach 43

Customer Reviews