From the course: Learning Mobile Device Security
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Securing device access
- [Instructor] Another security concern is mobile device access. Mobile devices will allow use without setting up security. However, it is now common practice for device manufacturers to nudge their users towards secure access, especially when initially setting up a device. The nudge means you must actively choose to be unsecure. For Android, device access can be set through swipe, pattern, password, PIN, or fingerprint. On an Apple device I can set device access security with a PIN, a custom numeric code, a custom alphanumeric code, touch ID, or facial recognition. Without security measures my device will be accessible immediately after I turn it on or wake it from sleep. Although this is certainly easy, it means my phone and what I do on it are all available to anyone holding it. This is akin to leaving home with your front door standing wide open. Leaving your phone with no security is risky in the extreme. Pattern security makes it just a bit more secure than no security. It's…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
(Locked)
Risks of technology2m 5s
-
(Locked)
Risks of mobile devices1m 31s
-
(Locked)
Acquire a device securely3m 6s
-
Dispose of a device securely1m 52s
-
(Locked)
Dispose of an Android device46s
-
(Locked)
Dispose of an iOS device47s
-
(Locked)
The layers of mobile device security1m
-
(Locked)
Securing mobile accounts2m 6s
-
(Locked)
Securing device access2m 42s
-
(Locked)
Securing device backups1m 22s
-
(Locked)
-
-
-
-
-