Security Threats Overview: Wired, Wireless, and Mobile |
CHAPTER 4 |
THIS CHAPTER PROVIDES a general overview of network security threats and considerations, with a particular focus on wireless and mobile devices (where it applies). In an ideal setting, security professionals could easily lock down any network or network-enabled device to mitigate the risk of data loss or unauthorized access. Unfortunately, your practice must be applied in the real world, where the business’s needs, third-party requirements, and employee satisfaction must be balanced with the security team’s priorities. This chapter aims to give you an understanding of the threats as well as an appreciation for the many factors that go into implementing a security strategy. ...
Get Wireless and Mobile Device Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.