From the course: Learning Mobile Device Security
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
The layers of mobile device security
From the course: Learning Mobile Device Security
The layers of mobile device security
- [Instructor] In order to provide secure use of any mobile device, we must consider the cooperative layers of security provided to the user. Layer one is account security. Mobile devices interact with and are empowered by their manufacturers through the use of cloud accounts. These cloud accounts have their own set of security concerns we will consider later in the course. These accounts provide access to software, device tracking, store email, store notes, provide file storage and store contact lists. Layer two is device security. The cooperative layers of the cloud accounts is the access security options provided on the device itself. This layer controls access to the use of the device. At this time, access security is provided by passwords, finger prints, and facial recognition. We will set up device access security in the coming videos. It should be noted that ignoring this step greatly exposes users to risk.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
(Locked)
Risks of technology2m 5s
-
(Locked)
Risks of mobile devices1m 31s
-
(Locked)
Acquire a device securely3m 6s
-
Dispose of a device securely1m 52s
-
(Locked)
Dispose of an Android device46s
-
(Locked)
Dispose of an iOS device47s
-
(Locked)
The layers of mobile device security1m
-
(Locked)
Securing mobile accounts2m 6s
-
(Locked)
Securing device access2m 42s
-
(Locked)
Securing device backups1m 22s
-
(Locked)
-
-
-
-
-