Over recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones, laptops, etc.) has increased rapidly. Innovative development perspectives and new tendencies such as BYOD (bring your own device) are exposing business information systems more than ever to various compromising threats. The safety control of remote access has become a strategic issue for all companies.
This book reviews all the threats weighing on these remote access points, as well as the existing standards and specific countermeasures to protect companies, from both the technical and organizational points of view. It also reminds us that the organization of safety is a key element in the implementation of an efficient system of countermeasures as well. The authors also discuss the novelty of BYOD, its dangers and how to face them.
1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility.
2.Threats and Attacks.
3. Technological Countermeasures.
4. Technological Countermeasures for Remote Access.
5. What Should Have Been Done to Make Sure Mr Rowley’s Day Really Was Ordinary.
Chapter 1 – An ordinary in the life of M. Rowley, or the dangers of virtualization and mobility.
Chapter 2 – Threats and attacks
Chapter 3 – Technological countermeasures
Chapter 4 – Technological countermeasures for remote access
Chapter 5 – What should have been done for M. Rowley’s day to be ordinary
Appendix 1 – Recap of security solutions
Appendix 2 – Glossary