3.5 Secure Mobile Solutions
Mobile Networks
Cellular network
Bluetooth - high speed communicated over short distance
RFID - access badge, inventory/assembly line tracking - uses Radar technology, RF powers the tag, ID is transmitted back
NFC - two way wireless communication - apple pay
Mobile Device Management
MDM (mobile device manager) - manage company-owned and user-owned mobile devices - centralized management of the mobile devices - set policies on apps, data, camera - control the remote device, the entire device or a partition
MCM - mobile content management - secure access to data - protect data from outsiders - data on mobile devices can be protected with Data Loss Prevention (DLP)
Remote wipe - remove all data from your mobile device, even if you lost the device
Geofencing - restrict or allow features when the device is in particular area
Biometrics - you are the authentication factor, easy to circumvent
Containerization - creating separate areas and partitions for private and other purposes - you both will have private information area and corporate-data area
FDE (full device encryption) - scramble all of the data on the mobile device, but always have the decryption key
Mobile Device Security
MicroSD HSM - hardware security module now in a microSD card form - provides security services, encryption, key generation, digital signature, authentication - secure storage, protect private keys, cryptocurrency storage
Unified endpoint management (UEM) - comprehensive approach to securing and controlling desktop computers, laptops, smartphones, and tablets in a connected, coherent manner from a single console
Mobile application management (MAM) - provision, update, and remove apps which keep every device running at the correct version
Mobile Device Enforcement
Rooting/jailbreaking = gaining access to the OS of the mobile device, you need to install a custom firmware to achieve this - you circumvent security features
USB OTG (on-the-go) = connecting mobile devices directly together
Mobile Deployment Models
BYOD - bring your own device - difficult to secure, need to meet the company's requirements
COPE - corporate owned, personally enabled - company buys the device, organization keeps full control of the device
CYOD - choose your own device
VDI/VMI - virtual desktop infrastructure/virtual mobile infrastructure - applications are separated from the mobile device - data is separated from the mobile device - data is stored securely, centralized
Last updated
Was this helpful?