Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD DevicesMost organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the IT organization but for the IT auditors as well. This book will serve as a guide to IT and Audit professionals on how to manage, secure and audit smart device. It provides guidance on the handling of corporate devices and the Bring Your Own Devices (BYOD) smart devices. |
Other editions - View all
Security and Auditing of Smart Devices: Managing Proliferation of ... Sajay Rai,Philip Chukwuma,Richard M. Cozart No preview available - 2016 |
Security and Auditing of Smart Devices: Managing Proliferation of ... Sajay Rai,Philip Chukwuma,Richard Cozart No preview available - 2016 |
Common terms and phrases
ability administrator allows Android device App Store Apple iOS devices Apple Pay Apple’s attacker audit audit/assurance authentication BlackBerry bluesnarfing Bluetooth BYOD camera certificate Client Access License cloud COMPANY’s configuration containerized corporate data corporate network credit card default value device’s employees enabled encryption ensure Enterprise Client Access environment Exchange ActiveSync Exchange Enterprise Client Figure Francis Group http://taylorandfrancis.com Google Play hacker hardware healthcare implement installed Internet iPad iPhone iTunes litigation hold malware MDM solution mobile device management monitor operating systems organization organization’s passcode password policy PayPal personal data phishing platform protect remote wipe risk S/MIME Samsung Samsung Pay security features security policy server service provider setting specifies smart device app smart device user smartphone Spoofing attacks spyware Symbian tablets Taylor & Francis text messages third-party apps tion user’s value is true virtual private network wearables Website whitelist Wi-fi