From the course: CISSP Cert Prep (2021): 4 Communication and Network Security

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Mobile connection methods

Mobile connection methods

From the course: CISSP Cert Prep (2021): 4 Communication and Network Security

Start my 1-month free trial

Mobile connection methods

- [Instructor] In order to secure mobile devices, cyber security professionals need to understand the various ways that mobile devices may gain access to data and connect to resources on other systems. There are quite a few connection technologies available and each has different uses. Let's take a look at a few important ones. Cellular networks operate in most urban and suburban areas around the world and in some cases, even in rural areas. These networks were originally used for voice communications, but they then expanded to include data service as cellular telephones made way for smart devices. Cellular networks cover a fairly large area with a single tower able to serve devices up to 20 or more miles away. Now the range of a tower depends significantly on the terrain, with towers near highways in the middle of the desert able to reach much farther than towers in a densely populated urban area. Cellular networks…

Contents