Today's networks include mobile devices. In this video, learn the importance of checking mobile devices for security gaps and vulnerabilities, along with compliance testing.
- [Narrator] Today's mobile devices … are essentially a small computer … designed to consume information. … In addition to making calls, … mobile devices have many functions. … Camera, read documents, read news, WiFi and others. … Mobile devices are small … and they can be easily lost or stolen. … Passwords can be compromised. … Because of an always on connection … and the amount of time spent on mobile devices, … users should take precautions to secure the device … and ensure the device only allows authorized transactions. … A couple of things that you should keep in mind … as far as mobile device best practice. … Keep software updated. … Patches and updates reduce the threat from malware attacks … and data exfiltration. … To slow someone down from gaining access … to your information, … use a pass phrase or password, … use a biometric such as a fingerprint if available, … and set idle timeout to lock the phone when not in use. … Use good web sense. … Use a secure connection such as HTTPS, …
Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10.
- Common causes of vulnerabilities
- Identifying and assessing vulnerabilities
- The Common Vulnerability Scoring System (CVSS)
- Outsourcing vulnerability analysis
- Leveraging Nikto and other vulnerability assessment tools
- Securing mobile devices
- Defending the LAN