Security+ SY0-601: 3.5: Secure Mobile Solutions

This entry is part 27 of 47 in the series [ Security+ SY0-601 ]

Chapter 21: Secure Mobile Solutions

A big part of this section is knowing the many ways to connect to a mobile device, and the vulnerabilities and security controls for each.

Connection Methods

Cellular

Wifi

SATCOM

Bluetooth

*up to 24Mbps!

NFC

ANT

Infrared (IRDA)

USB

MDM

      • Password strength
      • Encryption
      • Locking if inactive
      • Locking if lost
      • Wipe on login failures
      • Wipe if lost

Content management

Data ownership

Data custodian

Remote Wipe

Geofencing

Geolocation

Screen Locks

Push Services

Biometrics

Storage containerization

Full device encryption

Enforcement and Monitoring

App source control

Rooting / Jailbreaking

Sideloading

Custom firmware (ROMs)

SMS / MMS

Deployment Models

BYOD

CYOD

COPE

COBO

VDI

Citrix

Info
Formerly a Terminal Server solution, today Citrix uses the XEN hypervisor and Remote Desktop to provide a VDI environment.

 

VMware

 

Series Navigation<< Security+ SY0-601: 3.4: Wi-Fi SecuritySecurity+ SY0-601: 3.6: Cybersecurity Solutions in the Cloud >>