Mobile Device Deployment Methods + Hardening Mobile Devices

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/4

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

5 Terms

1
New cards

Bring-Your-Own-Device (BYOD)

places the control in the hands of the end user since they select and manage their own device. This option provides for less security and oversight for the organization

2
New cards

Choose-Your-Own-Device (CYOD)

the organization pays for the device and typically for the cellular plan or other connectivity. The user selects the device, sometimes from a list of preferred options, rather than bringing whatever they would like to use. Since ____ continues to leave the device in the hands of the user, security and management is likely to remain less standardized, although this can vary

3
New cards

In a Corporate-Owned-Personally-Enabled (COPE) model

the device is company owned and managed. This model allows the organization to control the device more fully while still allowing personal use

4
New cards

A fully corporate owned and managed device

is the most controlled environment

5
New cards

Hardening Mobile Devices

  • Application management

  • Content management

  • Remote wipe capabilities

  • Geolocation and geofencing

  • Screen locks, passwords, and PINs

  • Biometrics

  • Context aware authentication

  • Containerization

  • Storage segmentation

  • Full-device encryption (FDE)

  • Push notifications