2.5 Given a scenario, deploy mobile devices securely. Flashcards
Connection Methods
Mobile devices have become a huge concern in companies today due to the fact that they store local copies of company messages and company data. It is important to have strong policies surrounding the use of mobile devices such as smart phones and tablets and to ensure those policies are being followed
Connection Methods - Cellular
The most common method that mobile devices use to connect to the network or the Internet is via their cellular network. The cellular network is provided by the mobile device’s service provider.
Connection Methods - WiFi
Mobile devices can connect to company Wi-Fi networks to gain Internet connectivity and to access network resources. The Wi-Fi network is then connected to the corporate network.
Connection Methods - SATCOM
SATCOM is short for satellite communication and is a common connectivity method when sending or receiving small amounts of data, such as via point-of-sale systems.
Connection Methods - Bluetooth
Mobile devices can use Bluetooth to obtain a connection to a computer or device as long as the devices are in close proximity. Bluetooth uses the 2.4-GHz frequency.
Connection Methods - NFC
Near Field Communication allows two electronic devices to exchange data when they are placed within two inches of one another. You can use this to have devices share information such as contacts or to pay for a transaction.
Connection Methods - ANT
ANT is a wireless communication protocol that allows you to transfer data between devices. ANT uses the 2.4-GHz frequency like Bluetooth. Unlike Bluetooth, ANT does not use up as much battery life, which makes it a great fit for smart devices.
Connection Methods - Infrared
Infrared, or IR, is a wireless communication that relies on line of sight between the two devices sharing data via an infrared light.
Connection Methods - USB
You can connect your mobile device to the USB port of a system using a USB cable. This is common to transfer data such as videos or pictures to the computer.
Mobile Device Management Concepts
.
Mobile Device Management Concepts - Application Management
Implement any application controls on the device that restrict what the application can do or access.
Mobile Device Management Concepts - Content Management
Look to content-filtering features on the device that can block certain types of content.
Mobile Device Management Concepts - Remote Wipe
Mobile devices such as smartphones and tablets support remotely wiping the device if it is lost or stolen. Remotely wiping the device will erase all the data off it.
Mobile Device Management Concepts - Geofencing
Geofencing is a feature that allows administrators of software to define GPS coordinates that create a boundary (or virtual fence). When a device running the software goes outside the boundaries, an alarm is triggered.
Mobile Device Management Concepts - Geolocation
Geolocation is the term for identifying the geographic location of an item such as a mobile phone. For example, once the geolocation (GPS coordinates) of a mobile phone is determined, you can then associate that with a street address using mapping technologies.
Mobile Device Management Concepts - Screen Locks
It is critical to ensure that screens on mobile devices such as smartphones and laptops are configured to lock after a short period of inactivity. As a result, anyone wishing to use the mobile device and access the data on it must type the password for the device. So if you lose the device and someone finds it, they would need to know the password to access the data on the device.
Mobile Device Management Concepts - Push Notification Services
Mobile devices allow you to configure which push notification services to use to send status and notifications to the device.
Mobile Device Management Concepts - Passwords and Pins
Ensure all mobile devices have complex passwords configured to use the device and thus to access the data on it. For corporate devices, you can configure policies to enforce complex passwords for the device. For example, you can do this in ActiveSync policies on the Microsoft Exchange Server for mobile devices that support ActiveSync