Blackjacking security threats to Blackberry devices, PDAs, and cell phones in the enterprise
Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are the lifeline for companies large and small-and nobody knows this better than a hacker. Traditionally, security for mobile devices has held a low priority. Now, a certified ethical hacker exp...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Indianapolis, IN :
Wiley Pub
c2007.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009626975406719 |
Tabla de Contenidos:
- Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise; About the Author; Credits; Acknowledgments; Contents; What Is Blackjacking?; When Is a Computer Not a Computer?; The Flow of This Book; Part I: Understanding the Threats and Devices; Chapter 1: Understanding the Threats; Quantifying the Threat; Mobile Device Enterprise Infrastructure; PC and LAN Connectivity; Fundamental Changes in Security Strategy; Things to Remember; Chapter 2: Understanding the Devices; BlackBerrys; Pocket PCs; Palm Handhelds; Cell Phones; Things to Remember
- Part II: How BlackBerrys Are Hacked, and How to Protect ThemChapter 3: Exploiting BlackBerry Devices; Malware Is Threatening Your BlackBerry; Attacking a BlackBerry Directly; Intercepting BlackBerry Communication; Physically Compromising a BlackBerry by Spoofing and Intercepting Authentication; BlackBerry Security Checklist; Things to Remember; Chapter 4: Hacking the Supporting BlackBerry Infrastructure; Good and Bad: A Conduit to Your LAN; Understanding the BlackBerry Infrastructure; Attacking the BlackBerry Infrastructure; Things to Remember
- Chapter 5: Protecting Your PC and LAN from BlackBerrysControlling Data Is Critical; Threats from BlackBerry-Provided Internet Access; Controlling Data Coming from a BlackBerry; Things to Remember; Part III: How PDAs Are Hacked, and How to Protect Them; Chapter 6: Exploiting PDAs; Corrupting Your PDA with Malware; Targeting a PDA Directly; Intercepting PDA Communication; PDA Authentication Spoofing and Interception; Compromising the PDA Physically; Things to Remember; Chapter 7: Hacking the Supporting PDA Infrastructure; Connecting a PDA to the LAN Is Good and Bad
- Using PDA VPN Clients to Protect the InfrastructureThings to Remember; Chapter 8: Protecting Your PC and LAN from PDAs; Connecting PDAs to Enterprise Resources; PDAs May Be Contagious; Preventing PDAs from Bringing Malware into the Enterprise; Things to Remember; Part IV: How Cell Phones Are Hacked, and How to Protect Them; Chapter 9: Exploiting Cell Phones; Cell-Phone Malware; Stealing Data via Bluetooth; Intercepting Cell-Phone Communication; Physical Compromise and Cell-Phone Authentication Spoofing; Things to Remember; Chapter 10: Protecting the Enterprise PC and LAN from Cell Phones
- Cell Phones May Bring in MalwareExposing Enterprise Email; Exporting Enterprise Data and Clandestine Data Gathering; Things to Remember; Index; Appendix A: References