4.0 Application, Data and Host Security


4.2 Summarize mobile security concepts and technologies.

  • Device security
    • Full device encryption
    • Remote wiping
    • Lockout
    • Screen locks
    • GPS
    • Application control
    • Storage segmentation
    • Asset tracking
    • Inventory control
    • Mobile device management
    • Device access control
    • Removable storage
    • Disabling unused features
  • Application security
    • Key management
    • Credential management
    • Authentication
    • Geo-tagging
    • Encryption
    • Application whitelisting
    • Transitive trust/authentication
  • BYOD concerns
    • Data ownership
      • Support ownership
      • Patch management
      • Antivirus management
      • Forensics
      • Privacy
      • On-boarding/off-boarding
      • Adherence to corporate policies
      • User acceptance
      • Architecture/infrastructure considerations
      • Legal concerns
      • Acceptable use policy
      • On-board camera/video

Recommended

 





Associates