Presentation is loading. Please wait.

Presentation is loading. Please wait.

Mobile Device Security Management Leyna Belinsky.

Similar presentations


Presentation on theme: "Mobile Device Security Management Leyna Belinsky."— Presentation transcript:

1 Mobile Device Security Management Leyna Belinsky

2

3

4

5

6 Objectives What is a Mobile Device  Examples of Mobile Devices  Categories of Mobile Devices What you have to lose What Threats Exist Ways to minimize your risk  Policy  Physical Security  Protecting Information  Safe Connections

7 What is a Mobile Device? Mobile: capable of moving or being moved Device: a piece of equipment or a mechanism designed to serve a special purpose or perform a special function http://www.m-w.com/

8 Examples of Mobile Devices Cell Phone Smart Phone PDA USB keys Pocket PCs Laptops

9 Categories of Mobile Devices Limited Data Mobile Device: devices that have a small, primarily text-based screen, with data services usually limited to SMS (Short Message Service) and WAP access. Typical examples of these devices are cellular phones. Basic Data Mobile Device: devices that have a medium-size screen, menu or icon-based navigation via a thumb-wheel or cursor, and which offer access to e-mail, address book, SMS, and a basic web browser. Typical examples of these devices are BlackBerry and Smartphone. Enhanced Data Mobile Device: devices that have medium to large screens, stylus-based navigation, and which offer the same features as the "Basic Data Mobile Devices" plus native applications such as Microsoft Office Mobile applications and custom corporate applications such as mobilized versions of SAP, intranet portals, etc. Typical devices include those running Windows Mobile 2003 or version 5, such as Pocket PCs. http://en.wikipedia.org/wiki/Mobile_device

10 What do you have to lose? Physical Security Information Loss Device malfunctions Financial loss Organization image

11 Existing Threats Losing your device Theft of your device Signal interception Insecure networks BlueTooth Viruses and Worms

12 Minimizing your Risk Create Policies with the IT department Physical Protection Protecting Information Safe Connections

13 Creating a Policy Clear and easily understood Easy to implement Instruct exactly what is allowed Have lessons to show what to do IT department restrict what is connected to the organization’s network Only use company devices

14 Physical Security Don’t leave your device alone Keep it in a safe place Leave it at home in certain situations Environmental factors  Rain  Snow  Extreme heat

15 Protecting Information Turn off BlueTooth or other headsets when not in use Password protect Don’t save passwords Use encryptions Keep backups Keep screen locked Keep anti-virus software updated Necessary information only Only open files you know are safe http://searchsmb.techtarget.com/tip/0,289483,sid44_gci1198997,00.html

16 Safe Connections Know the network you connect to is safe Only allow approved devices onto your network Turn off Auto-run Limit port access Log everything that happens on your network

17 Summary What is a Mobile Device  Examples of Mobile Devices  Categories of Mobile Devices What you have to lose What Threats Exist Ways to minimize your risk  Policy  Physical Security  Protecting Information  Safe Connections

18 Any questions?


Download ppt "Mobile Device Security Management Leyna Belinsky."

Similar presentations


Ads by Google