Lesson 12 - Chapter 2: Securing Mobile Devices Flashcards
What do MDM policies combine to deal with mobile devices in the workplace?
combine a specialized app on the devices with specialized infrastructure
In what way do mobile devices have a similar feature to Bitlocker?
modern iOS and Android devices use full device encryption to protect the built-in storage
(so even if the phone is dismantled they can’t access your data)
Where do you go on an Apple device to access Find my Device when lost?
iCloud > Find my iPhone (works for iPads)
How does find my device work?
when the lost device accesses the Internet and receives an IP/MAC address, the service (like iCloud) will pinpoint the location within a few yards
What should you do if your phone is lost or stolen and you have sensitive information like bank details on it?
remotely wipe it
How do you access a corporate VPN?
may require a specific app approved by the organization
Do mobile devices use firewalls? Why or why not?
No because they don’t have a lot of services listening on open ports like a regular computer and the cellular and Wi-Fi networks mobile devices use employ their own firewalls to protect networked devices
Are there traditional software firewall packages available if you wanted to install one?
Yes, depending on the OS.
Android software firewall packages include basic rule elements to filter specific traffic coming to the host
(these work at a very basic level, keep in mind)