Security Threats Overview: Wired, Wireless, and Mobile

CHAPTER

4

THIS CHAPTER PROVIDES a general overview of network security threats and considerations, with a particular focus on wireless and mobile devices (where it applies). In an ideal setting, security professionals could easily lock down any network or network-enabled device to mitigate the risk of data loss or unauthorized access. Unfortunately, your practice must be applied in the real world, where the business’s needs, third-party requirements, and employee satisfaction must be balanced with the security team’s priorities. This chapter aims to give you an understanding of the threats as well as an appreciation for the many factors that go into implementing a security strategy. ...

Get Wireless and Mobile Device Security now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.