19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

In This Chapter<br />

Chapter 10<br />

Mobile Devices<br />

▶ Seeking out the common weaknesses in laptops, phones, and tablets<br />

▶ Executing security tests to uncover crucial mobile flaws<br />

▶ Minimizing mobile security risks<br />

M obile computing is the new frontier for business — and for hacking.<br />

It seems that everyone has a mobile device of some sort for either<br />

personal or business use; often both. If not properly secured, mobile devices<br />

connected to the enterprise network represent thousands upon thousands of<br />

unprotected islands of information floating about, out of your control.<br />

Because of all the phones, tablets, and laptops running numerous operating<br />

system platforms chock-full of apps, an infinite number of risks are associated<br />

with mobile computing. Rather than delving into all the variables, this<br />

chapter explores some of the biggest, most common mobile security flaws<br />

that could impact you and your business.<br />

Sizing Up Mobile Vulnerabilities<br />

It pays to find and fix the low-hanging fruit on your network. That’s where<br />

you get the most bang for your buck. The following mobile laptop, phone,<br />

and tablet weaknesses should be front and center on your priority list:<br />

✓ No encryption<br />

✓ Poorly implemented encryption<br />

✓ No power-on passwords<br />

✓ Easily guessed (or cracked) power-on passwords

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!