Page 113 - CISSO_Prep_ Guide
P. 113

that  could  be  used  to  launch  a  man-in-the-middle  attack  or
            highjack a user session.
            The other concern is that most of these mobile applications are
            running on personal devices that may be infected or compromised
            without user knowledge.



            BYOD
            Organizations  are  embracing  the  concept  of  Bring  Your  Own
            Device (BYOD) or sometimes jokingly referred to as Bring Your
            Own Disaster! The BYOD approach makes a lot of sense from a
            business perspective. Everyone can use devices that they possess,
            including mobile phones, tablets, laptops - devices that they are
            comfortable with, and that may save the organization the cost of
            purchasing!

            This does, however, pose some security concerns. What happens
            when the person leaves the company - especially involuntarily -
            is it possible to remove all organizational data from the device?
            What  if  the  device  is  compromised,  lost,  or  stolen?  Is  the
            confidential data on the device protected?
            There are several solutions the security manager must consider,
            including first and foremost policy. It is also possible to declare
            which devices are allowed and which are not. A virtual machine
            that can be remotely wiped in case of loss can be set up on some
            devices. Some devices will also allow encryption and two-factor
            authentication for access.
            As with all new technologies, the security manager must often
            understand that it may be impossible to stop the use of the new
            technology, but it is possible to put in place security controls to
            protect the use of the new technology as much as possible.
   108   109   110   111   112   113   114   115   116   117   118