1.4b - Mobile Device Connectivity: Professor Messer

Exam Objectives

Bluetooth

  • Enable Bluetooth: Ensure Bluetooth is turned on for the moble phone/tablet and the Bluetooth device (e.g., a headset) is in discoverable mode.

  • Enable pairing: Ensure the Bluetooth device (e.g., a headset) is in discoverable mode.

  • Find a device for pairing: Find the Bluetooth peripheral from your device’s settings

  • Enter the appropriate PIN code: Should be the same on both devices - ensures that the peripheral you’re pairing with your device is correct

  • Test connectivity: Devices should now communicate - check audio/phone for a headset, for example

Location services

  • Global Positioning System (GPS) services: Originally created via the US DoD, location is calculated via timing differences between different satellites - at least 4 are needed for location determination.

  • Cellular location services: Mobile phones can also use Wi-Fi and cell towers to give a more precise location.

Mobile device management (MDM)/mobile application management (MAM)

  • Manages company-owned and user-owned devices - can work with BYOD (Bring Your Own Device) policies

  • Centralized management of mobile devices - sets policies on application usage. Can control the entire device or a partition.

  • Manage access control for mobile devices

  • Corporate email configuration: User doesn’t need to configure anything - allows for account details/server addresses, communication methods

  • Two-factor authentication: MDMs can enforce specific authentication types

  • Corporate applications: Can ensure applications relevant to corporate use are installed on devices, and prevent certain applications from being installed for security purposes.

Bluetooth Pairing Process

  • Definition: The process of connecting an external device to a mobile phone or tablet.

  • Purpose: Security function that controls which devices can communicate with your device.

  • Verification: Often requires you to view or confirm a passphrase or PIN for security.

  • Reusability: This pairing only needs to be done once; devices will automatically reconnect in the future.

Steps for Bluetooth Pairing

  1. Enable Bluetooth: Both devices must have Bluetooth turned on, as some devices allow this feature to be disabled.

  2. Discoverable Mode: Devices must be set to discoverable mode, allowing them to be visible to each other. This may involve specific key sequences (e.g., holding a button on a headset).

  3. Selecting Device: After activation, the device will appear on a list of available devices that are discoverable.

  4. Confirmation: The user will typically need to confirm or enter a PIN to complete the pairing.

  5. Testing Connection: After pairing, connectivity can usually be tested to ensure communication is established between the devices.

GPS (Global Positioning System)

  • Overview: Used by mobile phones to communicate with GPS satellites for navigation.

  • History: Originally created by the US Department of Defense with over 30 satellites orbiting Earth.

  • Functionality: Precise location is determined based on signals from at least four satellites, calculating longitude, latitude, and altitude.

  • Data Visualization: Information is often displayed through maps and directions on the phone, showing current location relative to destination.

  • Additional Location Methods: Phones may also utilize Wi-Fi connectivity and cellular tower identification for improved location accuracy.

Mobile Device Management (MDM)

  • Purpose: Allows management of mobile devices within an organization, including both company-owned and employee-owned devices (BYOD).

  • Central Management: Managers can access and configure settings for all mobile devices from a single console.

  • Security Management: Essential for protecting company data, ensuring specific applications are installed, and managing device capabilities (e.g., camera access).

Functions of MDM

  • Data Partitioning: Helps separate company data from personal data, allowing for secure management.

  • Data Deletion Capabilities: Enables removal of company data without affecting personal information in case of security breaches.

  • Access Control: Can impose security measures like requiring automatic screen locks and PINs for unlocking devices.

  • User Experience: Simplifies user configuration by allowing automatic setup of emails and other services via MDM.

  • Security Enhancement: Supports two-factor authentication and may implement biometric features for device access.

  • Application Management:

    • Required Apps: MDM can push necessary applications to devices automatically.

    • Restrictions: Can prevent certain applications from being installed to enhance device security.

robot