Mobile Device Security For Dummies Read online




  Mobile Device Security For Dummies®

  Visit www.dummies.com/cheatsheet/mobiledevicesecurity to view this book's cheat sheet.

  Table of Contents

  Introduction

  About This Book

  Foolish Assumptions

  Conventions Used in This Book

  How This Book Is Organized

  Part I: Living Securely in the Smart World

  Part II: Implementing Enterprise Mobile Security

  Part III: Securing Smart Device Access

  Part IV: Securing Each Smart Device

  Part V: The Part of Tens

  Icons Used in This Book

  Where to Go from Here

  Part I: Living Securely in the Smart World

  Chapter 1: What’s So Smart About a Phone, Anyway?

  Exploring Different Mobile Devices

  Smartphones and tablets

  Laptops and netbooks

  Other computing devices

  Examining Operating Systems for Mobile Devices

  Apple iOS

  Google Android

  RIM BlackBerry OS

  RIM BlackBerry Tablet OS

  Microsoft Windows Mobile and Windows Phone

  Nokia Symbian

  HP Palm webOS

  MeeGo

  Samsung bada

  Discovering Data Connections

  Applications Galore: Exploring Mobile Device Applications

  E-mail and messaging

  Web-based applications

  Client/server applications

  Standalone applications

  Allowing Smartphones onto Your Network

  Educating yourself on the risks

  Scoping your deployment

  Creating a mobile device security policy

  Determining device configuration policies

  Figuring out how you’ll connect devices to your network(s)

  Devising an endpoint security strategy

  Planning a strategy to deal with loss and theft

  Seeking vendor info and requests for proposals

  Implementing a pilot

  Assessing and reevaluating at regular intervals

  Introduction: AcmeGizmo Enterprise Smartphone Deployment Case Study

  Exploring legacy smartphone deployment

  Enter the smartphone explosion

  Chapter 2 : Why Do I Care? The Mobile Device Threat

  Recognizing the Scope of the Threat

  Loss, theft, and replacement

  Really off-site data storage

  Free (but not necessarily nice) apps

  Network access outside of your control

  Understanding the Risks

  Opening the door to hackers

  Compromising your business communications

  Endangering corporate data

  Infesting enterprise systems by using location-based services

  Assessing the Arsenal

  To manage or not to manage

  Where the need for compliance comes in

  Mobile security apps start to emerge

  Planning to Sustainably Keep the Threat at Bay

  Establish enforceable policies

  Evaluate tools without biases

  Secure the location

  Mobile security 101 classes

  Turning mobile devices into allies

  Chapter 3 : Planning for Mobile Devices in the Enterprise

  Managing the New Wave of Mobile Devices

  Support the cutting-edge devices

  More than just e-mail

  Who moved my application?

  Updating your mobility policies

  Adapting to the New Challenges of Mobile Devices

  Protecting mobile devices from malware

  Managing device policies remotely

  Enforcing granular access control

  Part II: Implementing Enterprise Mobile Security

  Chapter 4: Creating Mobile Device Security Policies

  Recognizing the Importance of Enforceable Security Policies

  Understanding Device Policies

  Policies for physical device protection

  Policies for device backup and restore

  Using Provisioning Policies to Manage Devices

  Upgrade, downgrade, and software installation policies

  Profile settings policies

  Decommissioning policies

  Creating Effective Monitoring Policies

  Protecting Devices with Application Policies

  Case Study: AcmeGizmo Mobile Device Security Policy

  Chapter 5: Managing and Controlling Devices

  Managing Your Mobile Devices

  Managing devices over the air

  Configuring security policies

  Open Mobile Alliance Device Management

  Exchange ActiveSync

  Controlling Applications

  Pros and cons of consumer app stores

  Provisioning applications to mobile devices

  Blacklisting and removing applications

  Case Study: AcmeGizmo Application Control Deployment

  Your password, please

  Network settings

  Other settings

  Application provisioning

  Chapter 6: Conforming to Corporate Compliance Policies

  Which Devices Are Personal, and Which Are Corporate-Owned

  Setting Passcodes on Mobile Devices

  Encrypting the Contents of the Device

  Requiring VPN on the Device

  Protecting the Device from Viruses

  Protecting the Device from Loss and Theft

  Managing Devices at Scale

  Backing Up the Contents of the Device

  Monitoring and Controlling Contents of the Device

  Case Study: AcmeGizmo Compliance Requirements

  Operating system compliance

  Password compliance

  Encryption compliance

  VPN and endpoint security compliance

  Loss and theft protection

  Part III: Securing Smart Device Access

  Chapter 7: Securing Data in Transit with VPNs

  Comparing IPSec VPNs and SSL VPNs

  Validating User Identity for VPN Access

  Authenticating VPN users

  Determining a user’s role

  Discriminating by Device Profile

  Profiling devices and applying policies

  Providing access based on device profile

  Implementing custom policies

  Providing Application Access

  Enabling access to e-mail

  Providing Web application access

  Accessing full client/server applications

  Providing Users an Appropriate Level of Access

  Securely accessing e-mail, calendar, and contacts

  Accessing web-based applications

  Allowing users to leverage client/server applications

  Case Study: AcmeGizmo SSL VPN Rollout for Smartphones

  Employee authentication

  Accessing the network with SSL VPN

  Chapter 8: Connecting to Wi-Fi Networks

  What’s Wi-Fi, and Why Bother?

  Which Wi-Fi Networks Should Users Connect To?

  Open or insecure networks

  Encrypted Wi-Fi networks

  VPN on a Wi-Fi network

  Wi-Fi Connections from Mobile Devices

  Apple iPhones, iPads, and iPods

  Connecting to Wi-Fi with Android devices

  BlackBerry devices

  Implementing Wi-Fi Policies

  Part IV: Securing Each Smart Device

  Chapter 9: Device Security Component Overview

  Knowing Smartphone Security Compon
ents

  Understanding On-Device Anti-X Protection

  Antispyware

  Antivirus

  Antiphishing

  Antispam

  Using Backup and Restore Capabilities

  Adding Loss and Theft Protection

  Encryption and authentication techniques

  Immobilizing techniques

  Recovery techniques

  Controlling and Monitoring Applications

  Methods to control and monitor applications

  Identifying harmful applications

  Enterprise Management of Mobile Devices

  Device deployment

  Device discovery

  Device provisioning

  Device monitoring

  Compliance enforcement

  Chapter 10 : Hacker Protection and Enforceable Encryption

  Getting to Know the On-Device Security Components

  Keeping Devices Safe with On-device Firewalls

  Small footprint

  Efficient battery usage

  Dynamic adaptation to changing usage

  Protecting Against Viruses

  Firewalls and virus-based attacks

  Virtual device antivirus solutions

  Reducing Spam

  Service provider assistance

  Choosing an antispam solution

  Global operator initiative to combat spam

  Preventing Intrusion

  Using Enforceable Encryption

  Encrypting all outbound and inbound communication

  Encrypting only enterprise traffic

  Using carrier-provided voice encryption

  Case Study: AcmeGizmo Endpoint Security Deployment

  Endpoint security

  Device encryption

  Flash forward

  Chapter 11: Protecting Against Loss and Theft

  Taking Precautions before Loss or Theft

  Educating Users about Securing Data on a Lost Phone

  Protecting personal Apple iOS devices

  Protecting personal Symbian devices

  Protecting personal Android devices

  Protecting personal Windows Mobile and Windows Phone 7 Devices

  Protecting personal Blackberry devices

  Exploring Enterprise-Grade Solutions for Various Platforms

  Enterprise-grade solutions for Apple iOS

  Enterprise-grade solutions for Symbian

  Enterprise-grade solutions for Android

  Enterprise-grade solutions for Windows Mobile and Windows Phone 7

  Enterprise-grade solutions for Blackberry devices

  Deploying Enterprise-Wide Loss and Theft Protection

  Case Study: AcmeGizmo’s Lost or Stolen Device Recovery

  Chapter 12: Educating Users about Backing Up Data

  Backing Up Data from Smartphones

  Instructing Users on Backing Up Their Devices

  Backing up iPhones and iPads

  Backing up Android devices

  Backing up BlackBerry devices

  Backing up Nokia devices

  Backing up Windows Phone 7 devices

  Instructing Users on Restoring Data to Their Devices

  Restoring data from iPhones and iPads

  Restoring data from Android devices

  Restoring data from BlackBerry devices

  Restoring data from Nokia devices

  Restoring data from Windows Phone 7 devices

  Instructing Users on Transferring Data to New Devices

  Transferring data between iPhones and iPads

  Transferring data between Android devices

  Transferring data between BlackBerry devices

  Transferring data between Nokia Symbian devices

  Exploring Corporate Solutions for Backup and Restore

  Case Study: AcmeGizmo Backup and Restore Use Cases

  Chapter 13: Securing Mobile Applications

  Understanding the Importance of a Sandbox

  App Security on Various Platforms

  App security on BlackBerry devices

  App sandboxing on Apple iOS devices

  Android operating system security

  Exploring Virtualization for Mobile Devices

  Accounting for Personal Devices at Work

  Sandboxing Combined with On-Device Security

  Part V: The Part of Tens

  Chapter 14: Top Ten Online Information Sources

  Tech SANS

  Dark Reading

  F-Secure Security Threat Summaries

  Infosecurity Network

  National Institute of Standards and Technology (Security Research)

  Vendors’ Websites

  ICSA labs

  CERT

  US-CERT

  GSM Association

  Chapter 15: Top Ten Mobile Security Vendors

  AirWatch

  Good Technology

  Juniper Networks

  Mobile Active Defense

  McAfee

  MobileIron

  Sybase

  Symantec

  Tangoe

  Zenprise

  Cheat Sheet

  Mobile Device Security For Dummies®

  by Rich Campagna, Subbu Iyer, and Ashwin Krishnan

  Foreword by Mark Bauhaus

  Mobile Device Security For Dummies®

  Published by

  John Wiley & Sons, Inc.

  111 River St.

  Hoboken, NJ 07030-5774

  www.wiley.com

  Copyright © 2011 by John Wiley & Sons, Inc., Indianapolis, Indiana

  Published simultaneously in Canada

  No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

  Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book.

  Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Website is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Website may provide or recommendations it may make. Further, readers should be aware that Internet Websites listed in this work may have changed or disappeared between when this work was written and when it is read.

  For general information on our other products and services, please contact our Customer
Care Department within the U.S. at 877-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002.

  For technical support, please visit www.wiley.com/techsupport.

  Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.

  Library of Congress Control Number: 2011932276

  ISBN: 978-0-470-92753-3 (pbk); ISBN 978-1-118-09379-5 (ebk); ISBN 978-1-118-09380-1 (ebk); ISBN 978-1-118-09399-3 (ebk)

  Manufactured in the United States of America

  10 9 8 7 6 5 4 3 2 1

  About the Authors

  Rich Campagna is a Director of Product Management at Juniper Networks. His team is responsible for defining product strategy for Juniper Networks’ Junos Pulse Business Unit, including the Junos Pulse Mobile Security Suite, the SA Series SSL VPN product family, Juniper’s Unified Access Control product family, the Junos Pulse Application Acceleration product family, and the Junos Pulse client software. Rich was a co-author for Network Access Control For Dummies. Prior to joining Juniper Networks, Rich was a Sales Engineer at Sprint Corp. He received an MBA from UCLA Anderson School of Management and a BS in Electrical Engineering from Pennsylvania State University.

  Subbu Iyer is a Senior Product Manager at Juniper Networks. He drives the product strategy of the Junos Pulse product line, which provides a variety of integrated network services on desktops and mobile devices, including smartphones and tablets. His prior experience includes over eight years at Cisco where he held various senior architecture and engineering roles focusing on application-aware networking, security, and WAN acceleration. He has extensive experience in software development and marketing of products in the areas of Application and Network Security, including remote and LAN access control. Subbu holds an M.S. in Computer Engineering from the University of Arizona, Tucson and an M.B.A. from the Haas School of Business, UC Berkeley.