𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Securing Mobile Devices and Technology

✍ Scribed by Kutub Thakur, Al-Sakib Khan Pathan


Publisher
CRC Press
Tongue
English
Leaves
277
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks, while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobiles, IoT (Internet of Things) devices for shopping and password management, and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners.

✦ Table of Contents


Cover Page
Half Title Page
Title Page
Copyright Page
Dedication Page
Contents Page
Preface Page
Authors Page
Chapter 1 The Evolution of Data Communication Networks
1.1 Emergence of Data Communication Network
1.1.1 What Is Data Communication Network?
1.1.2 Early Communication Networks
1.1.3 Advent of Modern Data Communication
1.2 Wired Data Communication Networks
1.2.1 ARPA Communication Project
1.2.2 Types of Data Network Topologies
1.2.3 Major Data Communication Protocols
1.3 Wireless Data Communication Networks
1.3.1 What Is Wireless Communication Network?
1.3.2 Types of Wireless Networks
Chapter 2 History of Cellular Technology
2.1 What Is Cellular Technology?
2.2 Generations of Cellular Technologies
2.3 Future Cellular Technologies
Chapter 3 Role of Mobile Technology in Modern World
3.1 Present Global Market of Mobile Technology
3.2 Impact of Mobile Technology on Modern Business
3.2.1 Mobile Friendly Web Presence
3.2.2 Digital Marketing
3.2.3 Mobile Marketing
3.2.4 Video Marketing
3.3 Impact of Mobile Technology on Daily Life
3.4 Future Prospects of Mobile Technology
Chapter 4 Mobile Security in Perspective
4.1 What Is Mobile Security?
4.1.1 Mobile Network
4.1.2 Mobile Operating System
4.1.3 Mobile Applications
4.1.4 Internet of Things
4.2 Enterprise Perspective of Mobile Security
4.3 End User Perspective of Mobile Security
4.4 Mobile Security Impact on Enterprises
4.5 Mobile Security Impact on End Users
4.6 Big Mobile Security Breaches and Their Impact
4.6.1 Facebook Users’ Email Password Breach
4.6.2 German Celebrities’ and Politicians’ Personal Data Leakage
4.6.3 Taiwan Semiconductor Manufacturing Company Ransomware Attack
4.6.4 Sixty Million LinkedIn Users’ Personal Information Leakage
4.6.5 Over 6.7 Million Indian Aadhaar Card Number Leakage
4.6.6 Over 100 Million JustDial Users’ Personal Information Leaked
4.7 Future of Mobile Security
Chapter 5 Working Principle of Major Wireless Networks
5.1 Classification of Wireless Networks
5.2 Wireless Wide Area Network
5.2.1 Point-to-Point WWAN
5.2.2 Switched Wireless Network or Cellular Network
5.3 Wireless Metropolitan Area Network
5.3.1 Wi-Max
5.3.2 Long-Term Evolution
5.4 Wireless Local Area Network
5.4.1 Wi-Fi Overview
5.4.2 Different Types of Wi-Fi
5.5 Wireless Personal Area Network
5.5.1 Bluetooth
5.5.2 ZigBee
5.5.3 Near-Field Communication
Chapter 6 Working Principle of Cellular Network
6.1 Architecture of Cellular Network
6.1.1 GSM Cellular Mobile Network
6.1.2 CDMA 2000 IS-95 Cellular Mobile Network
6.1.3 UMTS Cellular Mobile Network
6.1.4 LTE Cellular Mobile Network
6.2 Terminologies of Cellular Network
6.2.1 Mobile Station
6.2.2 Frequency Reuse
6.2.3 Hand-Off/Handover
6.2.4 Base Transceiver Station
6.2.5 Radio Network
6.2.6 Core Network
6.2.7 Air Interface
6.2.8 Cell
6.2.9 Roaming
6.2.10 Dual Band
6.2.11 Quad Band
6.2.12 Talk Time
6.2.13 Network Capacity
6.3 Flow of a Cellular Data Connection
Chapter 7 Types of Mobile Security Threats
7.1 What Is a Mobile Security Threat?
7.1.1 Physical Threats
7.1.2 Logical Threats
7.2 General Categories of Logical Mobile Security Threats
7.2.1 Application-Level Mobile Security Threats
7.2.2 Network-Level Mobile Security Threats
7.2.3 Web-Level Mobile Security Threats
7.3 Types of Mobile Security Threats
7.3.1 Malware
7.3.2 Spyware
7.3.3 Phishing
7.3.4 Trojan Horses
7.3.5 Malicious Apps
7.3.6 Unsecure Wi-Fi Threats
7.3.7 Data Leakage through Apps
7.3.8 Broken Cryptography
7.3.9 Network Spoofing
7.3.10 IoT Vulnerabilities
7.3.11 Social Engineering Threat
7.3.12 Out-of-Date Software
7.3.13 Outdated Mobile Devices
7.3.14 Mobile Crypto-Jacking
7.3.15 Poor Password Management
7.3.16 Physical Security of Device
7.3.17 Unencrypted Communication
7.3.18 Mobile Botnet Threat
7.3.19 Rootkit Threat
7.3.20 Man-in-the-Middle Threat
7.3.21 Lack of Mobile Device Policy
7.3.22 Virus Threats
7.3.23 Worm Threats
7.4 Size of Mobile Security Threats
7.5 Future Threats of Mobile Security
Chapter 8 Mobile Security Threats in Internet-of-Things Ecosystem
8.1 What Is Internet of Things?
8.2 Security Vulnerabilities of IoT
8.2.1 Major Attacks on IoT
8.2.2 Major Security Threats against IoT Networks
8.3 How to Minimize IoT Security Threats
Chapter 9 How to Secure Your Mobile Devices
9.1 Securing Your Mobile from Physical Threats
9.1.1 Do Not Leave Mobile Devices Unattended
9.1.2 Be Inconspicuous While Using Mobiles Outside
9.1.3 Use a Physical Label on Your Device
9.1.4 Note Down Complete Information of Your Mobile Device
9.1.5 Install Mobile Anti-Theft or Remote Locking App
9.1.6 Install Motion Detectors
9.1.7 Lock SIMs
9.1.8 Useful Tips for Securing Your Phone from Physical Theft
9.2 Securing Your Mobile from Cyber Threats
9.2.1 Install Professional Antivirus Software
9.2.2 Use Strong Passwords
9.2.3 Avoid Free and Rogue Apps
9.2.4 Update Operating Systems
9.2.4.1 Updating Android Operating System
9.2.4.2 Updating iOS Operating System
9.2.4.3 Updating iPadOS Operating System
9.2.4.4 Updating Windows Phone
9.2.5 Update Applications Regularly
9.2.6 Avoid Using Insecure Hotspots
9.2.7 Backup Your Data Regularly
9.2.8 Use Unlock Authentication
9.2.9 Avoid Storing Personal/Financial Data on Mobiles
9.2.10 Stay Informed and Updated
Chapter 10 Mobile Password Management
10.1 Importance of Strong Password
10.2 What Types of Passwords Are in Use?
10.3 Major Types of Password Hacking Attacks
10.3.1 Brute Force Attacks
10.3.2 Phishing Attacks
10.3.3 Dictionary Attacks
10.3.4 Shoulder Surfing
10.3.5 Trapping into Trust
10.4 Useful Tips on Creating a Strong Password
10.5 How to Create and Manage Secure Passwords
10.6 Using Password Managers
10.7 Top Five Password Managers for Mobile Devices
10.7.1 Dashlane
10.7.2 LastPass
10.7.3 Zoho Vault
10.7.4 Keeper
10.7.5 1Password
Chapter 11 Securing Wireless Network Communication
11.1 Service Provider Level Security
11.1.1 User Premises Level Security
11.1.2 Network Service Provider Level Security
11.1.3 Cloud-Based Service Provider Level Security
11.2 End-to-End Encryption
11.3 Using Virtual Private Network
11.3.1 NordVPN
11.3.2 Cyber Ghost VPN
11.3.3 Private Internet Access VPN
11.3.4 Hotspot Shield
11.3.5 Express VPN
11.3.6 Tunnel Bear VPN
11.4 Implementing Access Control List
11.5 Installing Firewall on Company’s Local Network
11.6 Wi-Fi Security
11.7 Bluetooth Security
11.7.1 Bluetooth Security Modes
11.7.2 Useful Tips to Secure Bluetooth Network
11.8 Useful Tips on Securing Network Communication
Chapter 12 Secure Shopping through Mobiles
12.1 Importance of Online Shopping through Mobiles
12.2 Why Online Shopping through Mobile Is Growing Fast?
12.3 Challenges of Online Shopping Via Mobiles
12.4 Ways of Online Shopping through Mobile
12.4.1 Shopping through Browser
12.4.2 Shopping through App
12.4.3 Shopping through Mobile Phone Call
12.5 How to Shop Securely through Mobile Apps
12.6 How to Shop Securely through Mobile Browsers
Chapter 13 World of Mobile Apps
13.1 Introduction to Mobile Apps World
13.1.1 Major Categories of Mobile Apps
13.1.2 History of Mobile Apps
13.2 Impact of Mobile Apps on Our Society
13.3 Top Mobile App Stores
13.3.1 Google Play Store
13.3.2 Apple App Store
13.3.3 Windows Phone Store
13.3.4 Amazon Appstore
13.3.5 Blackberry World
13.4 Threats Emanating around Mobile Apps
13.5 Using Mobile Apps Securely
13.5.1 Choosing the Right Mobile Application
13.5.2 Useful Tips to Use Mobile Apps Securely
Chapter 14 Mobile Wireless Technology and Security Standards
14.1 Major Wireless Technology Standard Bodies
14.1.1 Institute of Electrical and Electronics Engineers
14.1.2 ITU-R
14.1.3 The Wi-Fi Alliance
14.1.4 GSM Association
14.1.5 3GPP
14.1.6 European Telecommunications Standards Institute
14.1.7 Telecommunication Industry Association
14.2 Overview of Major Wireless Technology Standards
14.2.1 Technology Standards in Terms of Generations
Zero Generation
First Generation (1G)
Second Generation
Third Generation
Fourth Generation
Fifth Generation
14.2.2 Technology Standards in Terms of Area Coverage
Wireless Wide Area Networks
Wireless Local Area Networks
Wireless Personal Area Network
14.2.3 Technology Standards in Terms of Usage
14.3 Data Communication-Related Mobile Security Standards
14.3.1 Service Set Identifier
14.3.2 MAC Address Filtering
14.3.3 Wired Equivalent Privacy
14.3.4 Wi-Fi Protected Access
14.3.5 Wi-Fi Protected Access v2
14.3.6 Robust Security Network
14.3.7 Advanced Encryption Standard
14.3.8 Extensible Authentication Protocol
14.3.9 Virtual Private Network Security
Bibliography
Index


πŸ“œ SIMILAR VOLUMES


Wireless and Mobile Device Security
✍ Jim Doherty πŸ“‚ Library πŸ“… 2021 πŸ› Jones & Bartlett Learning 🌐 English

The world of wireless and mobile devices is evolving rapidly, with many individuals relying solely on their wireless devices in the workplace and in the home. The growing use of mobile devices demands that organizations become more educated in securing this technology and determining how to best pro

Wireless and Mobile Device Security
✍ Jim Doherty πŸ“‚ Library πŸ“… 2021 πŸ› Jones & Bartlett Learning 🌐 English

<span>The world of wireless and mobile devices is evolving rapidly, with many individuals relying solely on their wireless devices in the workplace and in the home. The growing use of mobile devices demands that organizations become more educated in securing this technology and determining how to be

Wireless and Mobile Device Security
✍ Jim Doherty πŸ“‚ Library πŸ“… 2021 πŸ› Jones & Bartlett Learning 🌐 English

<span>The world of wireless and mobile devices is evolving rapidly, with many individuals relying solely on their wireless devices in the workplace and in the home. The growing use of mobile devices demands that organizations become more educated in securing this technology and determining how to be

Mobile Devices: Tools and Technologies
✍ Lauren Collins, Scott R. Ellis πŸ“‚ Library πŸ“… 2015 πŸ› Chapman and Hall/CRC 🌐 English

<P>Wireless and mobile communications have grown exponentially. The average individual now possesses a minimum of two smart mobile devices. The consistent advancement of mobile devices feeds the ever-growing appetite for faster bandwidth, uninterrupted connectivity, applications to fulfill the needs

Mobile devices : tools and technologies
✍ Lauren Collins; Scott R Ellis πŸ“‚ Library πŸ“… 2015 πŸ› CRC Press LLC 🌐 English

Mobile Devices: Tools and Technologies provides readers with an understanding of the mobile landscape available to app developers, system and network engineers, and the avid techie. As the trend of mobile technology has enabled the continuous development of ubiquitous applications, this book offers