From the course: Learning Mobile Device Security

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

The layers of mobile device security

The layers of mobile device security

From the course: Learning Mobile Device Security

Start my 1-month free trial

The layers of mobile device security

- [Instructor] In order to provide secure use of any mobile device, we must consider the cooperative layers of security provided to the user. Layer one is account security. Mobile devices interact with and are empowered by their manufacturers through the use of cloud accounts. These cloud accounts have their own set of security concerns we will consider later in the course. These accounts provide access to software, device tracking, store email, store notes, provide file storage and store contact lists. Layer two is device security. The cooperative layers of the cloud accounts is the access security options provided on the device itself. This layer controls access to the use of the device. At this time, access security is provided by passwords, finger prints, and facial recognition. We will set up device access security in the coming videos. It should be noted that ignoring this step greatly exposes users to risk.

Contents