Download presentation
Presentation is loading. Please wait.
1
Mobile Device Security Management Leyna Belinsky
6
Objectives What is a Mobile Device Examples of Mobile Devices Categories of Mobile Devices What you have to lose What Threats Exist Ways to minimize your risk Policy Physical Security Protecting Information Safe Connections
7
What is a Mobile Device? Mobile: capable of moving or being moved Device: a piece of equipment or a mechanism designed to serve a special purpose or perform a special function http://www.m-w.com/
8
Examples of Mobile Devices Cell Phone Smart Phone PDA USB keys Pocket PCs Laptops
9
Categories of Mobile Devices Limited Data Mobile Device: devices that have a small, primarily text-based screen, with data services usually limited to SMS (Short Message Service) and WAP access. Typical examples of these devices are cellular phones. Basic Data Mobile Device: devices that have a medium-size screen, menu or icon-based navigation via a thumb-wheel or cursor, and which offer access to e-mail, address book, SMS, and a basic web browser. Typical examples of these devices are BlackBerry and Smartphone. Enhanced Data Mobile Device: devices that have medium to large screens, stylus-based navigation, and which offer the same features as the "Basic Data Mobile Devices" plus native applications such as Microsoft Office Mobile applications and custom corporate applications such as mobilized versions of SAP, intranet portals, etc. Typical devices include those running Windows Mobile 2003 or version 5, such as Pocket PCs. http://en.wikipedia.org/wiki/Mobile_device
10
What do you have to lose? Physical Security Information Loss Device malfunctions Financial loss Organization image
11
Existing Threats Losing your device Theft of your device Signal interception Insecure networks BlueTooth Viruses and Worms
12
Minimizing your Risk Create Policies with the IT department Physical Protection Protecting Information Safe Connections
13
Creating a Policy Clear and easily understood Easy to implement Instruct exactly what is allowed Have lessons to show what to do IT department restrict what is connected to the organization’s network Only use company devices
14
Physical Security Don’t leave your device alone Keep it in a safe place Leave it at home in certain situations Environmental factors Rain Snow Extreme heat
15
Protecting Information Turn off BlueTooth or other headsets when not in use Password protect Don’t save passwords Use encryptions Keep backups Keep screen locked Keep anti-virus software updated Necessary information only Only open files you know are safe http://searchsmb.techtarget.com/tip/0,289483,sid44_gci1198997,00.html
16
Safe Connections Know the network you connect to is safe Only allow approved devices onto your network Turn off Auto-run Limit port access Log everything that happens on your network
17
Summary What is a Mobile Device Examples of Mobile Devices Categories of Mobile Devices What you have to lose What Threats Exist Ways to minimize your risk Policy Physical Security Protecting Information Safe Connections
18
Any questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.