From the course: CISSP Cert Prep (2021): 4 Communication and Network Security
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Mobile connection methods
From the course: CISSP Cert Prep (2021): 4 Communication and Network Security
Mobile connection methods
- [Instructor] In order to secure mobile devices, cyber security professionals need to understand the various ways that mobile devices may gain access to data and connect to resources on other systems. There are quite a few connection technologies available and each has different uses. Let's take a look at a few important ones. Cellular networks operate in most urban and suburban areas around the world and in some cases, even in rural areas. These networks were originally used for voice communications, but they then expanded to include data service as cellular telephones made way for smart devices. Cellular networks cover a fairly large area with a single tower able to serve devices up to 20 or more miles away. Now the range of a tower depends significantly on the terrain, with towers near highways in the middle of the desert able to reach much farther than towers in a densely populated urban area. Cellular networks…
Contents
-
-
-
-
-
-
-
-
-
-
(Locked)
Mobile connection methods4m 2s
-
(Locked)
Mobile device security3m 3s
-
(Locked)
Mobile device management6m 28s
-
(Locked)
Mobile device tracking3m 5s
-
(Locked)
Mobile application security3m 54s
-
(Locked)
Mobile security enforcement3m 54s
-
(Locked)
Bring your own device (BYOD)4m 35s
-
(Locked)
Mobile deployment models2m 55s
-
(Locked)
-
-