2.8 Given a scenario, implement methods for securing mobile devices.
2.8 Given a scenario, implement methods for securing mobile devices.
• Screen locks
Screen locks • Restrict access to the device • You’re going to leave it somewhere.
• Android: Lock the device and require a Google login
Settings>display>screen lock > fingerprnt
A device, usually integrated into a mobile device, that reads the user’s fingerprint to determine whether to grant access to the device.
•Settings>display>screen lock > face recognition.
Swipe lock- Settings>display>screen lock >
Settings>display>screen lock >Enter passcode twice>ok.
• Remote wipes
Locator applications and remote wipe • Built-in GPS • And location “helpers” • Find your phone on a map
• Locator applications
Locator applications and remote wipe • Built-in GPS • And location “helpers” • Find your phone on a map
• Remote backup applications
• Failed login attempts restrictions
* Android: Lock the device and require a Google login
• Antivirus/Anti-malware
• Patching/OS updates
Patching/OS updates • All devices need updates - Even mobile devices
• Biometric authentication
• Full device encryption
• Multifactor authentication
• Authenticator applications
Authenticator apps • Pseudo-random token generators • A useful authentication factor
• Trusted sources vs. untrusted sources
• Firewalls
Firewalls • Mobile phones don’t include a firewall • Most activity is outbound, not inbound
• Policies and procedures
FOR HW- BYOD vs. corporate-owned
• Policies and procedures
FOR - User Profile security requirements