Securing Mobile Devices

  • 2h 12m
  • ISACA
  • ISACA
  • 2012

Securing Mobile Devices should be read in the context of the existing publications COBIT 5 for Information Security, Business Model for Information Security (BMIS) and COBIT 5 itself.

This publication is intended for several audiences who use mobile devises directly or indirectly. These include end users, IT administrators, information security managers, service providers for mobile devices and IT auditors.

The main purpose of applying COBIT 5 to mobile device security is to establish a uniform management framework and to give guidance on planning, implementing and maintaining comprehensive security for mobile devices in the context of enterprises. The secondary purpose is to provide guidance on how to embed security for mobile devices in a corporate governance, risk management and compliance (GRC) strategy using COBIT 5 as the overarching framework for GRC.

In this Book

  • Introduction
  • Mobile Device Impact on Business and Society
  • Threats, Vulnerabilities and Associated Risk
  • Security Governance
  • Security Management for Mobile Devices
  • Hardening Mobile Devices
  • Mobile Device Security Assurance
  • Guiding Principles for Mobile Device Security
  • Sources
  • Glossary

YOU MIGHT ALSO LIKE

Rating 4.6 of 22 users Rating 4.6 of 22 users (22)
Rating 4.8 of 44 users Rating 4.8 of 44 users (44)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)