O'Reilly logo

CompTIA Security+ SY0-401 In Depth by Mark Ciampa

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

chapter 10Mobile Device Security

After completing this chapter, you should be able to do the following:

• List and compare the different types of mobile devices

• Explain the risks associated with mobile devices

• List ways to secure a mobile device

• Explain how to apply mobile device app security

• Describe how to implement BYOD security

Today’s Attacks and Defenses

One of the greatest risks to mobile phones is not that determined attackers will circumvent the secure technology defenses on the phone to steal important data. Instead, it’s the risk of the owner laying the phone down in a public place and then walking off without it. A recent study looked at what actually happens to lost phones in order to determine how vulnerable the information ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required