二十一点游戏:安全威胁企业中的Blackberry、PDA与手机Blackjacking
分類: 图书,进口原版书,经管与理财 Business & Investing ,
作者: Daniel V. Hoffman 著
出 版 社:
出版时间: 2007-4-1字数:版次: 1页数: 292印刷时间: 2007/04/01开本: 16开印次: 1纸张: 胶版纸I S B N : 9780470127544包装: 平装编辑推荐
作者简介:Daniel V. Hoffman, CISSP, CEH, CWNA has more than a decade of experience in remote-access security. He has built his expertise as an IT Director and U.S. Coast Guard Telecommunications Specialist, and is currently a Senior Engineer architecting security solutions for the largest companies in the world. He is known for his live hacking demonstrations, and his hacking videos have been featured in the Department of Homeland Security's open source infrastructure report.
内容简介
Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.
Traditionally, security for mobile devices—which are essentially portable computers loaded with sensitive corporate and client information—has had low priority. Now, a certified ethical hacker explains why this must change and how to change it. Packed with sobering examples of actual attacks, this book shows you how to mount your counterattack.
Understand each type of mobile device and the nature of the threat to each
Recognize and implement a strong security strategy
Identify specific threats to BlackBerry devices
Learn from analysis of actual exploits
Be able to anticipate future forms of attack
See how hackers create and modify their assaults
Defend against physical compromise and contamination from PC or LAN connectivity
目录
About the Author
Acknowledgments
Introduction
Chapter 1 Understanding the Threats
antifying the Threat
The Malware Threat
Direct Attack
Data-Communication Interception
Authentication Spoofing and Sniffing
Physical Compromise
Mobile Device Enterprise Infrastructure
PC and LAN Connectivity
Fundamental Changes in Scurity Strategy
Protecting the Mobile Device Itself
Enforcing Compliance on the Mobile Device
Addressing Security Deficiencies Automatically
Implementing Layered Security
Controlling and Protecting Data
Things to Remember
Chapter 2 Understanding the Devices
BlackBerrys
BlackBerry Business Phones
BlackBerry Handheld Devices
BlackBerry-Enabled Devices
Pocket PCs
Dell Axim Pocket PCs
HP Pocket PCs
Palm Pocket PCs
Motorola Pocket PC
Palm Handhelds
Palm Smartphones
Cell Phones
Symbian OS Cell Phones
Non–Symbian OS Cell Phones
Things to Remember
Chapter 3 Exploiting BlackBerry Devices
Malware Is Threatening Your BlackBerry
Analyzing a Malware Attack
Attacking a BlackBerry Directly
Intercepting BlackBerry Communication
Physically Compromising a BlackBerry by Spoofing and Intercepting Authentication
BlackBerry Security Checklist
Things to Remember
Chapter 4 Hacking the Supporting BlackBerry Infrastructure
Good and Bad: A Conduit to Your LAN
Understanding the BlackBerry Infrastructure
Attacking the BlackBerry Infrastructure
Things to Remember
Chapter 5 Protecting Your PC and LAN from BlackBerrys
Chapter 6 Exploiting PDAs
Chapter 7 Hacking the Supporting PDA Infrastructure
Chapter 8 Protecting Your PC and LAN from PDAs
Chapter 9 Exploiting Cell Phones
Chapter 10 Protecting the Enterprise PC and LAN from Cell Phones
Index