Securing Mobile Devices and Technology
- Length: 260 pages
- Edition: 1
- Language: English
- Publisher: CRC Press
- Publication Date: 2021-12-17
- ISBN-10: 1032136111
- ISBN-13: 9781032136110
- Sales Rank: #0 (See Top 100 Books)
This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobile, IoT (Internet of Things) devices for shopping and password management and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners.
Cover Page Half Title Page Title Page Copyright Page Dedication Page Contents Page Preface Page Authors Page Chapter 1 The Evolution of Data Communication Networks 1.1 Emergence of Data Communication Network 1.1.1 What Is Data Communication Network? 1.1.2 Early Communication Networks 1.1.3 Advent of Modern Data Communication 1.2 Wired Data Communication Networks 1.2.1 ARPA Communication Project 1.2.2 Types of Data Network Topologies 1.2.3 Major Data Communication Protocols 1.3 Wireless Data Communication Networks 1.3.1 What Is Wireless Communication Network? 1.3.2 Types of Wireless Networks Chapter 2 History of Cellular Technology 2.1 What Is Cellular Technology? 2.2 Generations of Cellular Technologies 2.3 Future Cellular Technologies Chapter 3 Role of Mobile Technology in Modern World 3.1 Present Global Market of Mobile Technology 3.2 Impact of Mobile Technology on Modern Business 3.2.1 Mobile Friendly Web Presence 3.2.2 Digital Marketing 3.2.3 Mobile Marketing 3.2.4 Video Marketing 3.3 Impact of Mobile Technology on Daily Life 3.4 Future Prospects of Mobile Technology Chapter 4 Mobile Security in Perspective 4.1 What Is Mobile Security? 4.1.1 Mobile Network 4.1.2 Mobile Operating System 4.1.3 Mobile Applications 4.1.4 Internet of Things 4.2 Enterprise Perspective of Mobile Security 4.3 End User Perspective of Mobile Security 4.4 Mobile Security Impact on Enterprises 4.5 Mobile Security Impact on End Users 4.6 Big Mobile Security Breaches and Their Impact 4.6.1 Facebook Users’ Email Password Breach 4.6.2 German Celebrities’ and Politicians’ Personal Data Leakage 4.6.3 Taiwan Semiconductor Manufacturing Company Ransomware Attack 4.6.4 Sixty Million LinkedIn Users’ Personal Information Leakage 4.6.5 Over 6.7 Million Indian Aadhaar Card Number Leakage 4.6.6 Over 100 Million JustDial Users’ Personal Information Leaked 4.7 Future of Mobile Security Chapter 5 Working Principle of Major Wireless Networks 5.1 Classification of Wireless Networks 5.2 Wireless Wide Area Network 5.2.1 Point-to-Point WWAN 5.2.2 Switched Wireless Network or Cellular Network 5.3 Wireless Metropolitan Area Network 5.3.1 Wi-Max 5.3.2 Long-Term Evolution 5.4 Wireless Local Area Network 5.4.1 Wi-Fi Overview 5.4.2 Different Types of Wi-Fi 5.5 Wireless Personal Area Network 5.5.1 Bluetooth 5.5.2 ZigBee 5.5.3 Near-Field Communication Chapter 6 Working Principle of Cellular Network 6.1 Architecture of Cellular Network 6.1.1 GSM Cellular Mobile Network 6.1.2 CDMA 2000 IS-95 Cellular Mobile Network 6.1.3 UMTS Cellular Mobile Network 6.1.4 LTE Cellular Mobile Network 6.2 Terminologies of Cellular Network 6.2.1 Mobile Station 6.2.2 Frequency Reuse 6.2.3 Hand-Off/Handover 6.2.4 Base Transceiver Station 6.2.5 Radio Network 6.2.6 Core Network 6.2.7 Air Interface 6.2.8 Cell 6.2.9 Roaming 6.2.10 Dual Band 6.2.11 Quad Band 6.2.12 Talk Time 6.2.13 Network Capacity 6.3 Flow of a Cellular Data Connection Chapter 7 Types of Mobile Security Threats 7.1 What Is a Mobile Security Threat? 7.1.1 Physical Threats 7.1.2 Logical Threats 7.2 General Categories of Logical Mobile Security Threats 7.2.1 Application-Level Mobile Security Threats 7.2.2 Network-Level Mobile Security Threats 7.2.3 Web-Level Mobile Security Threats 7.3 Types of Mobile Security Threats 7.3.1 Malware 7.3.2 Spyware 7.3.3 Phishing 7.3.4 Trojan Horses 7.3.5 Malicious Apps 7.3.6 Unsecure Wi-Fi Threats 7.3.7 Data Leakage through Apps 7.3.8 Broken Cryptography 7.3.9 Network Spoofing 7.3.10 IoT Vulnerabilities 7.3.11 Social Engineering Threat 7.3.12 Out-of-Date Software 7.3.13 Outdated Mobile Devices 7.3.14 Mobile Crypto-Jacking 7.3.15 Poor Password Management 7.3.16 Physical Security of Device 7.3.17 Unencrypted Communication 7.3.18 Mobile Botnet Threat 7.3.19 Rootkit Threat 7.3.20 Man-in-the-Middle Threat 7.3.21 Lack of Mobile Device Policy 7.3.22 Virus Threats 7.3.23 Worm Threats 7.4 Size of Mobile Security Threats 7.5 Future Threats of Mobile Security Chapter 8 Mobile Security Threats in Internet-of-Things Ecosystem 8.1 What Is Internet of Things? 8.2 Security Vulnerabilities of IoT 8.2.1 Major Attacks on IoT 8.2.2 Major Security Threats against IoT Networks 8.3 How to Minimize IoT Security Threats Chapter 9 How to Secure Your Mobile Devices 9.1 Securing Your Mobile from Physical Threats 9.1.1 Do Not Leave Mobile Devices Unattended 9.1.2 Be Inconspicuous While Using Mobiles Outside 9.1.3 Use a Physical Label on Your Device 9.1.4 Note Down Complete Information of Your Mobile Device 9.1.5 Install Mobile Anti-Theft or Remote Locking App 9.1.6 Install Motion Detectors 9.1.7 Lock SIMs 9.1.8 Useful Tips for Securing Your Phone from Physical Theft 9.2 Securing Your Mobile from Cyber Threats 9.2.1 Install Professional Antivirus Software 9.2.2 Use Strong Passwords 9.2.3 Avoid Free and Rogue Apps 9.2.4 Update Operating Systems 9.2.4.1 Updating Android Operating System 9.2.4.2 Updating iOS Operating System 9.2.4.3 Updating iPadOS Operating System 9.2.4.4 Updating Windows Phone 9.2.5 Update Applications Regularly 9.2.6 Avoid Using Insecure Hotspots 9.2.7 Backup Your Data Regularly 9.2.8 Use Unlock Authentication 9.2.9 Avoid Storing Personal/Financial Data on Mobiles 9.2.10 Stay Informed and Updated Chapter 10 Mobile Password Management 10.1 Importance of Strong Password 10.2 What Types of Passwords Are in Use? 10.3 Major Types of Password Hacking Attacks 10.3.1 Brute Force Attacks 10.3.2 Phishing Attacks 10.3.3 Dictionary Attacks 10.3.4 Shoulder Surfing 10.3.5 Trapping into Trust 10.4 Useful Tips on Creating a Strong Password 10.5 How to Create and Manage Secure Passwords 10.6 Using Password Managers 10.7 Top Five Password Managers for Mobile Devices 10.7.1 Dashlane 10.7.2 LastPass 10.7.3 Zoho Vault 10.7.4 Keeper 10.7.5 1Password Chapter 11 Securing Wireless Network Communication 11.1 Service Provider Level Security 11.1.1 User Premises Level Security 11.1.2 Network Service Provider Level Security 11.1.3 Cloud-Based Service Provider Level Security 11.2 End-to-End Encryption 11.3 Using Virtual Private Network 11.3.1 NordVPN 11.3.2 Cyber Ghost VPN 11.3.3 Private Internet Access VPN 11.3.4 Hotspot Shield 11.3.5 Express VPN 11.3.6 Tunnel Bear VPN 11.4 Implementing Access Control List 11.5 Installing Firewall on Company’s Local Network 11.6 Wi-Fi Security 11.7 Bluetooth Security 11.7.1 Bluetooth Security Modes 11.7.2 Useful Tips to Secure Bluetooth Network 11.8 Useful Tips on Securing Network Communication Chapter 12 Secure Shopping through Mobiles 12.1 Importance of Online Shopping through Mobiles 12.2 Why Online Shopping through Mobile Is Growing Fast? 12.3 Challenges of Online Shopping Via Mobiles 12.4 Ways of Online Shopping through Mobile 12.4.1 Shopping through Browser 12.4.2 Shopping through App 12.4.3 Shopping through Mobile Phone Call 12.5 How to Shop Securely through Mobile Apps 12.6 How to Shop Securely through Mobile Browsers Chapter 13 World of Mobile Apps 13.1 Introduction to Mobile Apps World 13.1.1 Major Categories of Mobile Apps 13.1.2 History of Mobile Apps 13.2 Impact of Mobile Apps on Our Society 13.3 Top Mobile App Stores 13.3.1 Google Play Store 13.3.2 Apple App Store 13.3.3 Windows Phone Store 13.3.4 Amazon Appstore 13.3.5 Blackberry World 13.4 Threats Emanating around Mobile Apps 13.5 Using Mobile Apps Securely 13.5.1 Choosing the Right Mobile Application 13.5.2 Useful Tips to Use Mobile Apps Securely Chapter 14 Mobile Wireless Technology and Security Standards 14.1 Major Wireless Technology Standard Bodies 14.1.1 Institute of Electrical and Electronics Engineers 14.1.2 ITU-R 14.1.3 The Wi-Fi Alliance 14.1.4 GSM Association 14.1.5 3GPP 14.1.6 European Telecommunications Standards Institute 14.1.7 Telecommunication Industry Association 14.2 Overview of Major Wireless Technology Standards 14.2.1 Technology Standards in Terms of Generations Zero Generation First Generation (1G) Second Generation Third Generation Fourth Generation Fifth Generation 14.2.2 Technology Standards in Terms of Area Coverage Wireless Wide Area Networks Wireless Local Area Networks Wireless Personal Area Network 14.2.3 Technology Standards in Terms of Usage 14.3 Data Communication-Related Mobile Security Standards 14.3.1 Service Set Identifier 14.3.2 MAC Address Filtering 14.3.3 Wired Equivalent Privacy 14.3.4 Wi-Fi Protected Access 14.3.5 Wi-Fi Protected Access v2 14.3.6 Robust Security Network 14.3.7 Advanced Encryption Standard 14.3.8 Extensible Authentication Protocol 14.3.9 Virtual Private Network Security Bibliography Index
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.