Tuesday, September 24, 2013

Hacking Exposed Mobile Security Secrets & Solutions


Hacking Exposed Mobile Security Secrets & Solutions by Neil Bergman, Mike Stanfield, Jason Rouse and Joel Scambray provides a great overview of the new threats created by cell devices. Like the other books in the sequence, it gives summary of the problems, shows how attackers will use vulnerabilities to compromise and exploit cellular units, along with showing you how you can secure your cellular devices and enterprise mobile platforms against these threats.

The 9 chapters within the book provide a complete and meticulous synopsis of the entire core areas round security and privateness issues about cellular computing. The primary two chapters present a radical analysis of the cellular risk ecosystem and how the cellular networks operate.

One of the major risks detailed in chapter 1 is that of physical risks. When knowledge resides in physical data facilities, a company can have some semblance of assurance of safety given the info has multiple layers of physical controls in an enterprise knowledge heart or colocation. The authors note that physical entry to cellular devices is difficult to defend in opposition to for very long, and the complete phenomenon of rooting and jailbreaking definitely proves this.

Additionally they write that they have yet to discover a mobile application that they could not defeat when given physical access, including defeating the mobile gadget management software. The book astutely notes that if your cell risk model assumes that information may be securely saved indefinitely on a physical cell device, then you're beginning with a false assumption. Your entire book is predicated on the belief of an attacker gaining control of the cellular device. To compensate for that, the book provides the requisite countermeasures.

One other bit of sagacious recommendation in the book is guaranteeing your developers, and those you outsource your development to, understand the specific risks and vulnerabilities round cellular apps. An interesting part of the chapter is on find out how to jailbreak Apple devices. But the authors additionally note that there are pros and cons to jailbreaking. The principle destructive is that you simply expose yourself to quite a lot of attack vectors that could lead to a whole compromise of the device. A non-jailbroken machine obviates that typically given the safety controls in place.

The book also sheds mild on the truth that even these iOS is a closed system with less threat vectors, it's still far from perfect. The Apple App Retailer, even with its safety controls, is way from impervious to attack. The chapter tells the story of a few malicious apps that slipped previous security critiques and found themselves on the Apple App Store. While these malicious apps had been later eliminated, they will there lengthy sufficient to cause damage.

More details about this book...

or

Download Hacking Exposed Mobile Security Secrets & Solutions PDF Ebook :

0 comments:

Post a Comment