Chapter 21: Secure Mobile Solutions
A big part of this section is knowing the many ways to connect to a mobile device, and the vulnerabilities and security controls for each.
Connection Methods
Cellular
Wifi
SATCOM
Bluetooth
*up to 24Mbps!
NFC
ANT
Infrared (IRDA)
USB
MDM
-
-
- Password strength
- Encryption
- Locking if inactive
- Locking if lost
- Wipe on login failures
- Wipe if lost
-
Content management
Data ownership
Data custodian
Remote Wipe
Geofencing
Geolocation
Screen Locks
Push Services
Biometrics
Storage containerization
Full device encryption
Enforcement and Monitoring
App source control
Rooting / Jailbreaking
Sideloading
Custom firmware (ROMs)
SMS / MMS
Deployment Models
BYOD
CYOD
COPE
COBO
VDI
Citrix
![Info](http://localhost/wp-content/uploads/2020/10/Info-24x24-1.png)
Formerly a Terminal Server solution, today Citrix uses the XEN hypervisor and Remote Desktop to provide a VDI environment.
VMware