From the course: CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Mobile connection methods

Mobile connection methods

- [Instructor] In order to secure mobile devices, cyber security professionals need to understand the various ways that mobile devices may gain access to data and connect to resources on other systems. There are quite a few connection technologies available and each has different uses. Let's take a look at a few important ones. Cellular networks operate in most urban and suburban areas around the world. And in some cases, even in rural areas. These networks were originally used for voice communications, but they then expanded to include data service as cellular telephones made way for smart devices. Cellular networks cover a fairly large area, with a single tower able to serve devices up to 20 or more miles away. Now the range of a tower depends significantly on the terrain, with towers near highways in the middle of the desert able to reach much farther than towers in a densely-populated urban area. Cellular networks…

Contents