Time
33 hours 23 minutes
Difficulty
Beginner
CEU/CPE
33

Video Transcription

00:01
Hello and welcome back to Sai Berries. 2019 Comp Tia Security Plus Certification Preparation course
00:09
record 13. Our discussion of marginal to and the topic of discussion will be the main to technology and tools.
00:17
We have a brand new objective which encompasses this particular module.
00:22
It's titled 2.5, giving a scenario Deplore mobile devices securely.
00:29
This brings to our first pre assessment coursed in
00:33
what you need determine whether or not this particular statement either true or false,
00:37
and it reads as follows. Blue two can be described as data communications standing, using while this technology is that true or false?
00:47
If he's like the true, you're absolutely correct,
00:51
given a scenario. Deplore mobile devices securely here again. Other topics which encompasses this particular objective, ranging from the connection methods sell your all way down to USB.
01:04
Now we begin to price it, taking a look at mobile computing.
01:08
Oddly, we noticed growing
01:11
new functionalities rotting routinely introduce, and people are doing mawr on their mobile devices than you ever can imagine been done in the past
01:21
Here again, or something different connection methods that you need to be a way off
01:25
first, we'll take a look call, Sell you this where the tablet and phone are using three G for G 05 G to connect to that provider without needing any other devices. WiFi is a wireless local area networking technology that uses radio technology to communicate.
01:42
SAT com is a technology that uses satellites to communicate, set, come camp about Internet access and boss communication to devices, homes as well as businesses.
01:53
Bluetooth is also a data communication standard using wireless technology over 100 meters or less, often more or less.
02:01
Some additional connection methods is called a term call near field communication NFC. It's normal, used to make Wallace payments when the cart must be with then four centimeters off the card reader
02:15
and basically is a preparatory Wallace networking technology most of used by smart wearables such as you hear such your heart rate monitors, your smart watches and your sleep trackers. Infrared. Basically, this is a wireless technology that relies on like that humans can't detect with their eyes.
02:35
The U. S B could be used to transfer data between devices as it is self installing, and security teams tend to use group policies to prevent data being stolen by removed devices. Other words that used a term called data loss prevention.
02:52
This brings us to some of dis objectives for this particular one diesel topics that encompassed this particular objective.
02:59
We begin the process taking a look at mobile device magic concepts ranging from application management all the way down. Tofu Device type Encryption
03:07
Now mobile devices is basis software that allows security administrators to control, secure and enforce policy on smartphones, tablets and other in point devices.
03:21
Here again at some concepts, a term in a moment of ice concept that you obviously need to understand. We have a term called application management in this case that uses whiteness to control which applications are allowed to be install onto a mobile device. Content management. It does essentially stores
03:38
been his data in a secure area
03:40
off the device in an encrypted format to protect it against attacks.
03:46
Remote wipe.
03:46
Basically, when our mobile device has been lost a stone,
03:51
it can be remotely wipe. Device will revert to his factory setting, and the data would don't long will be available.
03:58
Geo fencing. Basically what it does, it uses GPS, the global Positioning Satellites, R F I. D. to define the geographical boundaries. Once the advice is taken passed to define boundaries, the security team will be. Obviously, in this case, they will be alerted
04:15
again, some additional. Once called Geo location based on what it does, this one uses GPS to give the actual location of a mobile device. This is used when you lose your iPad and then you use your iPhone determines location.
04:29
This could be very useful if you lose or drop a device.
04:32
Screen locks based in strong password needed to secure your mobile devices, as mentioned in a lot of people doing a lot of different financial transactions on these various mobile devices. And so what you want to make you take advantage of the very security mechanisms. We also have a concept called push notification services.
04:50
Now push notifications services.
04:53
Notify your motive eyes When an email Mrs arrived at your in box
04:58
passwords and pins, someone of mobile devices such as your smartphones are very easy to steal, and you conceal them by putting them obviously in your pocket.
05:08
Some additional concepts called biometrics mobile devices, can use biometrics such as fingerprint or facial recognition. Apple uses a tough I Touch I D. And Max abuses a window. Hello.
05:19
We have also contacts. Aware of dedication.
05:24
Basic. This is a A contents of West Security is located location based, in other words, whether uses is located, who use the ears, what they uses, a question how to use is connected and also when he uses requesting that information
05:38
content realization basis is a storage segmentation will allow you to keep your person that a separate from your business data on a on a cell phone is also known as container ization.
05:49
Then we have storage segmentation basis whether external devices connected to a laptop, for example, USB, flash drive or secure data. But because it's secure data card or SD card,
06:01
then we have four device encryption
06:04
in this case to protect it that is stored on a device. We should implement a technique called four device
06:12
encryption.
06:15
Continue on with this particular video
06:16
taking a look at enforcement monitoring for again, we have to look at the third party stores all way down to a payment method so we're continuing and take a look at these different and define exactly what these various terms mean.
06:31
So we have 1/3 party store, absolute or third party APP stores, not the third party APP stores. There's a danger of download an app from third party APP stores as there's no guarantee of the quality of the at being a stall.
06:45
This could pose a potential security. Rest later, you'll find out that you have embedded a mountain software that could be an issue.
06:51
We are house after routing or jail breaking
06:55
basically removes that bender prescription on the mobile device to allow unsupported software to be installed.
07:01
Side loading is having an application package in a dot a PK format and then installing it on your mobile device. This is useful for developers who want to trial third party APS,
07:14
but it also allows another. I saw what they run on that mobile device. So again you have to realize that pose a potential security risks. We have custom firm, well, custom, firmer, firmer downloads are our use
07:27
so that you can root your what we call your mobile device
07:30
carrier, unlocking its where a mobile device is no longer tied to the original carrier. This will allow you to use your device with any other provider
07:41
firmware ot a firmware is software that is installed on a smaller read only memory chip on a home where hardware device and is used to control the heart were running on that device.
07:53
Camera used. We have smartphones and tablets rule out with very good quality cameras, and our days and video recorders whose media can be calculated are circulated on the social media within seconds.
08:05
We also have a short message service Assam's, which is known as a text message and has become a common method nowadays of communication.
08:13
External media is some devices except what we call the sternum media.
08:16
Then we have our U S B o T g basically USB on the go. What it does enable compatible devices to read data from a USB drive without going through a computer.
08:30
In addition, enforcement recording, uh, in terms for monitoring we have, according microphone. Virtually all of the smartphones are they have a built in microphone that can be used to record audio.
08:41
Global positioning said, like tagging is when you take a photograph or GPS tagging import that locates where that photograph was taken. Most of modern smartphones that they can do this by in fact, by default
08:54
y five. The regular ad hoc basis the WiFi direct Wallace network allows to WiFi devices to connect each other without work. Quietly. Wallace Access Point
09:05
Tittering Basic Teetering basis. What your GPS enabled smartphone can be attached to a mobile device to provide Internet access
09:13
payment methods. Smartphones nowadays allow credit card details to be stored locally so that the phone could be used to make what we call contact list payments.
09:26
Some additional objectives continuing with this particular get is called deployment model that they had several different deployment models that we need to talk about here,
09:33
and what we're gonna do is first of all, just take a look at bring your own device and then move it over down the VD. I'm discuss exactly what they are in this particular video.
09:43
Now, mobile device is now using Area Day lives, and they pose problems for security teams as a very portable. And they're screaming easy in case most cases to steal
09:54
first, when we have is a bring your own devices where you bring your personally own device to use in the workplace.
10:01
Cope basically stands for corporate own personal personally enable. It's where the company what it does. It purchased the device, such as a time but ah phone or laptop and allows US unemployed to use it for personal use.
10:16
Choose your own device.
10:18
In this case, it aborts problems of ownership because the company has a variety of tapas
10:22
phones as well as laptops.
10:26
Then we come to some of distant improvement. Modest, called corporate all model
10:31
now is a traditional model whereby the organization buys maintains of how often this model does not. A lot of employees use the device for personal use.
10:41
Then we have the virtual desktop infrastructure or beady eye. This is where an employee desktop is based in the cloud or a virtual platform, and this can be accessed by using a mobile device such as a tablet or a laptop.
10:58
At this point in time, we have our post assessment course in
11:03
what you need to do is determine whether or not the statement here either true or false,
11:07
and it reads as follows.
11:09
You bring your own devices where you bring your personal own device to use in the workplace. Is that your false?
11:18
Is that true? You're absolutely correct.
11:22
So again, bring your devices are personally owned devices. This base is now to our key takeaways. From this particular video.
11:30
We learned that MD of the software that allows security administrators to control, secure and enforce policies on smartphones,
11:37
tablets and other important devices reloaded. The virtual desktop infrastructure is one that provides virtual desktop to the user,
11:45
ready to corporately own personal enable.
11:48
It's where the company purchases the device, such as a tablet, a phone or laptop and allows employees use it for personal use.
11:56
We have choose your own device.
11:58
Basically, this does to avoid the problems of ownership, because the company as a writer, in this case of a writer of tablets, phones as well as laptops,
12:07
smartphone and tablets rollout again two down days where they have pretty good quality cameras and video recorders whose media can be circulated on social meter within minutes
12:18
or seconds. In other words,
12:20
at this point in time, we'll be taken moved on upcoming video by taking a look at 2.6 with this title giving us scenario,
12:28
implement secure protocols, look forward to seeing in the very next video

Up Next

CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

Instructed By

Instructor Profile Image
Jim Hollis
Independent Contractor
Instructor