Chapter 9: Mobile Devices
A big part of this section is knowing the many ways to connect to a mobile device, and the vulnerabilities and security controls for each.
Connection Methods
Cellular
Wifi
SATCOM
Bluetooth
up to 24Mbps
NFC
ANT
Infrared (IRDA)
USB
MDM
- Password strength
- Encryption
- Locking if inactive
- Locking if lost
- Wipe on login failures
- Wipe if lost
Content management
Data ownership
Data custodian
Remote Wipe
Geofencing
Geolocation
Screen Locks
Push Services
Biometrics
Storage containerization
Full device encryption
Enforcement and Monitoring
App source control
Rooting / Jailbreaking
Sideloading
Custom firmware (ROMs)
SMS / MMS
Deployment Models
BYOD
CYOD
COPE
COBO
VDI