Chapter 21: Secure Mobile Solutions
A big part of this section is knowing the many ways to connect to a mobile device, and the vulnerabilities and security controls for each.
Connection Methods
Cellular
Wifi
SATCOM
Bluetooth
*up to 24Mbps!
NFC
ANT
Infrared (IRDA)
USB
MDM
-
-
- Password strength
- Encryption
- Locking if inactive
- Locking if lost
- Wipe on login failures
- Wipe if lost
-
Content management
Data ownership
Data custodian
Remote Wipe
Geofencing
Geolocation
Screen Locks
Push Services
Biometrics
Storage containerization
Full device encryption
Enforcement and Monitoring
App source control
Rooting / Jailbreaking
Sideloading
Custom firmware (ROMs)
SMS / MMS
Deployment Models
BYOD
CYOD
COPE
COBO
VDI
Citrix
Formerly a Terminal Server solution, today Citrix uses the XEN hypervisor and Remote Desktop to provide a VDI environment.
VMware