From the course: Ethical Hacking: Vulnerability Analysis
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Securing mobile devices
From the course: Ethical Hacking: Vulnerability Analysis
Securing mobile devices
- [Instructor] Today's mobile devices are essentially a small computer designed to consume information. In addition to making calls, mobile devices have many functions, camera, read documents, read news, WiFi and others. Mobile devices are small and they can be easily lost or stolen. Passwords can be compromised. Because of an always on connection and the amount of time spent on mobile devices, users should take precaution to secure the device and ensure the device only allows authorized transactions. A couple of things that you should keep in mind as far as mobile device best practice. Keep software updated. Patches and updates reduce the threat from malware attacks and data exfiltration. To slow someone down from gaining access to your information, use a passphrase or password. Use a biometric such as a fingerprint if available and set idle timeout to lock the phone when not in use. Use use good web sense. Use a…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.