2.5 Given a scenario, deploy mobile devices securely. Flashcards
Connection Methods
Mobile devices have become a huge concern in companies today due to the fact that they store local copies of company messages and company data. It is important to have strong policies surrounding the use of mobile devices such as smart phones and tablets and to ensure those policies are being followed
Connection Methods - Cellular
The most common method that mobile devices use to connect to the network or the Internet is via their cellular network. The cellular network is provided by the mobile device’s service provider.
Connection Methods - WiFi
Mobile devices can connect to company Wi-Fi networks to gain Internet connectivity and to access network resources. The Wi-Fi network is then connected to the corporate network.
Connection Methods - SATCOM
SATCOM is short for satellite communication and is a common connectivity method when sending or receiving small amounts of data, such as via point-of-sale systems.
Connection Methods - Bluetooth
Mobile devices can use Bluetooth to obtain a connection to a computer or device as long as the devices are in close proximity. Bluetooth uses the 2.4-GHz frequency.
Connection Methods - NFC
Near Field Communication allows two electronic devices to exchange data when they are placed within two inches of one another. You can use this to have devices share information such as contacts or to pay for a transaction.
Connection Methods - ANT
ANT is a wireless communication protocol that allows you to transfer data between devices. ANT uses the 2.4-GHz frequency like Bluetooth. Unlike Bluetooth, ANT does not use up as much battery life, which makes it a great fit for smart devices.
Connection Methods - Infrared
Infrared, or IR, is a wireless communication that relies on line of sight between the two devices sharing data via an infrared light.
Connection Methods - USB
You can connect your mobile device to the USB port of a system using a USB cable. This is common to transfer data such as videos or pictures to the computer.
Mobile Device Management Concepts
.
Mobile Device Management Concepts - Application Management
Implement any application controls on the device that restrict what the application can do or access.
Mobile Device Management Concepts - Content Management
Look to content-filtering features on the device that can block certain types of content.
Mobile Device Management Concepts - Remote Wipe
Mobile devices such as smartphones and tablets support remotely wiping the device if it is lost or stolen. Remotely wiping the device will erase all the data off it.
Mobile Device Management Concepts - Geofencing
Geofencing is a feature that allows administrators of software to define GPS coordinates that create a boundary (or virtual fence). When a device running the software goes outside the boundaries, an alarm is triggered.
Mobile Device Management Concepts - Geolocation
Geolocation is the term for identifying the geographic location of an item such as a mobile phone. For example, once the geolocation (GPS coordinates) of a mobile phone is determined, you can then associate that with a street address using mapping technologies.
Mobile Device Management Concepts - Screen Locks
It is critical to ensure that screens on mobile devices such as smartphones and laptops are configured to lock after a short period of inactivity. As a result, anyone wishing to use the mobile device and access the data on it must type the password for the device. So if you lose the device and someone finds it, they would need to know the password to access the data on the device.
Mobile Device Management Concepts - Push Notification Services
Mobile devices allow you to configure which push notification services to use to send status and notifications to the device.
Mobile Device Management Concepts - Passwords and Pins
Ensure all mobile devices have complex passwords configured to use the device and thus to access the data on it. For corporate devices, you can configure policies to enforce complex passwords for the device. For example, you can do this in ActiveSync policies on the Microsoft Exchange Server for mobile devices that support ActiveSync
Mobile Device Management Concepts - Biometrics
Some devices may allow the configuration of biometrics in order to use the device. For example, some devices may do a retina scan or fingerprint read in order to authenticate to the device.
Mobile Device Management Concepts - Context-aware Authentication
Context-aware authentication is a new type of security feature that allows an application or cloud service to be aware of your habit —for example, the location you usually log on from, or the device you typically use to log on. With context-aware authentication, if the system determines there is high confidence it is actually you using your credentials (based on the context), then you have a simple logon experience. If the system rates low confidence that it is actually you who is logging in, then it resorts to enforcing a more complicated logon approach involving solutions such as two-factor authentication.
Mobile Device Management Concepts - Containerization
Sometimes referred to as sandboxing, you can run software on the device that creates a security container that prevents access to sensitive data stored on the device.
Mobile Device Management Concepts - Storage Segmentation
Some devices allow you to segment the storage on the device, allowing you control over what data can be accessed. For example, a mobile device may segment corporate data from personal data, allowing you to wipe the corporate data only if the company needs you to.
Mobile Device Management Concepts - Full Device Encryption
Most mobile devices support encrypting data on the device. Device encryption is critical to ensure that anyone who is able to connect the device or its memory to a computer cannot read the data.
Enforcement and Monitoring
Organizations typically have strict requirements regarding how their devices should and should not be used. When managing your organization’s mobile devices, it is important that you enforce the organization’s policies by monitoring how devices are being used and looking for policy violations.