课程: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

免费学习该课程!

今天就开通帐号,24,600 门业界名师课程任您挑!

Mobile security enforcement

Mobile security enforcement

- [Instructor] Mobile devices are packed with a wide variety of features and new ones appear on the market each time that the manufacturer upgrades devices. security professionals should carefully monitor the use of these features and enforce restrictions on features that may pose a risk to security. I've already explained how you can use mobile device management, or MDM, solutions to restrict the configuration of mobile devices and enforce your organization's security policies. There are some ways that users might attempt to circumvent these controls. First, if you depend upon the device manufacturer's app store for the use of trusted apps, you should know that there are a variety of third-party app stores available on the internet, and those may not be as reliable and secure as the manufacturer's app store. Installing apps from unofficial sources is known as side loading as it bypasses the normal application loading procedure. Now, this is much more of a problem on Android devices…

内容