Security: How to Deploy Mobile Security - Paiet/Tech-Journal-for-Everything GitHub Wiki

  • Connection methods
    • Cellular
    • WiFi
    • SATCOM
    • Bluetooth
    • NFC
    • ANT
    • Infrared
    • USB
  • Mobile device management concepts
    • Application management
    • Content management
    • Remote wipe
    • Geofencing
    • Geolocation
    • Screen locks
    • Push notification services
    • Passwords and pins
    • Biometrics
    • Context-aware authentication
    • Containerization
    • Storage segmentation
    • Full device encryption
  • Enforcement and monitoring for:
    • Third-party app stores
    • Rooting/jailbreaking
    • Sideloading
    • Custom firmware
    • Carrier unlocking
    • Firmware OTA updates
    • Camera use
    • SMS/MMS
    • External media
    • USB OTG
    • Recording microphone
    • GPS tagging
    • WiFi direct/ad hoc
      • WiFi direct poses a security risk on mobile devices because by connecting to WiFi direct enabled device the recipient device might not have security enforced or expose company data.
      • ad hoc - this can pose a security risk as mobile devices using ad hoc sessions connect to each other without the use of a managing access point, lack of encryption and/or security.
    • Tethering
    • Payment methods
  • Deployment models
    • BYOD
    • COPE
    • CYOD Correction to the acronym in the show I say "Carry Your Own Device" and then give the explanation, the explanation is correct however the acronym is wrong the following is correct "Choose Your Own Device"
    • Corporate-owned
    • VDI