Security+ Domain 2.0: Technologies and Tools, Chapter 9

Chapter 9: Mobile Devices

A big part of this section is knowing the many ways to connect to a mobile device, and the vulnerabilities and security controls for each.

Connection Methods

Cellular

Wifi

SATCOM

Bluetooth

up to 24Mbps

NFC

ANT

Infrared (IRDA)

USB

MDM

  • Password strength
  • Encryption
  • Locking if inactive
  • Locking if lost
  • Wipe on login failures
  • Wipe if lost

Content management

Data ownership

Data custodian

Remote Wipe

Geofencing

Geolocation

Screen Locks

Push Services

Biometrics

Storage containerization

Full device encryption

Enforcement and Monitoring

App source control

Rooting / Jailbreaking

Sideloading

Custom firmware (ROMs)

SMS / MMS

Deployment Models

BYOD

CYOD

COPE

COBO

VDI