Security: How to Deploy Mobile Security - Paiet/Tech-Journal-for-Everything GitHub Wiki
Connection methods
Cellular
WiFi
SATCOM
Bluetooth
NFC
ANT
Infrared
USB
Mobile device management concepts
Application management
Content management
Remote wipe
Geofencing
Geolocation
Screen locks
Push notification services
Passwords and pins
Biometrics
Context-aware authentication
Containerization
Storage segmentation
Full device encryption
Enforcement and monitoring for:
Third-party app stores
Rooting/jailbreaking
Sideloading
Custom firmware
Carrier unlocking
Firmware OTA updates
Camera use
SMS/MMS
External media
USB OTG
Recording microphone
GPS tagging
WiFi direct/ad hoc
WiFi direct poses a security risk on mobile devices because by connecting to WiFi direct enabled device the recipient device might not have security enforced or expose company data.
ad hoc - this can pose a security risk as mobile devices using ad hoc sessions connect to each other without the use of a managing access point, lack of encryption and/or security.
Tethering
Payment methods
Deployment models
BYOD
COPE
CYOD Correction to the acronym in the show I say "Carry Your Own Device" and then give the explanation, the explanation is correct however the acronym is wrong the following is correct "Choose Your Own Device"