2.7 Common Methods for Securing Mobile & Embedded Devices Flashcards
Screen Locks - Facial recognition
Unlock with your face
Screen Locks - PIN codes
Unlock with a pin code
Screen Locks - Fingerprint
Unlock with your fingerprint
Screen Locks - Pattern
Unlock with a pattern
Screen Locks - Swipe
Unlock with a swipe pattern
Remote Wipes
GPS find your device, if you cannot find the device you can remotely delete (wipe) all the data
Locator applications
OS updates
Constantly update to the latest updates
Device encryption
Encrypt all device data
Remote backup applications
Back up data
Failed login attempts restrictions
Lock out if multiple failed log in attempts
Antivirus/anti-malware
Malware is harder to apply to IOS device than Android
Firewalls
Mobile phones do not have firewall by default
Policies & Procedures - BYOD vs. corporate owned
Managed policies for security on these mobile devices
Policies & Procedures - Profile security requirements
Admin can disable camera functionality when in the office on your device