1 hour 1 minute
in previous lesson. You have seen the techniques about that. They're used for hacking the notebooks and tablets.
And in this
a lesson on video. I'm going to talk about recent built responsibilities off people.
Ah, that are involving mobile security. So if you're,
basically using your phone by yourself. So if it's your private funding off course, you are the only responsible person, maybe some people from the network in terms of protecting the network. But when comes to the phone itself, it's your responsibility.
So in this video you will see who is responsible for mobile device security. And if it's company issued or cooperate issued from
then, I'm going to talk about responsibilities off I T departments, meaning I T and I t Security Department
and, of course, responsibilities of users.
regarding mobile device, the greatest responsibility for security of more well devices yours
because you are all
time in possession of the device. So
first thing is, don't lose it, so behave
responsibly. Then don't let it be stolen.
And basically don't do any crazy things regarding that device. So don't let it
don't test if it can be dropped from. I don't know 1.5 meter height.
Although maybe the specifications say can,
um don't, uh, leave it unattended.
Um, and even if the
this place broken,
uh, don't think that the wise can The data from your device cannot be access. So, um,
don't throw it away.
Take it to the
because somebody can just get your
broken device. Replace the display, which is not working, but the rest of devices working and they can access the data. Or they can just disassemble your device, get access to the mother board and then find a way to collect data directly from the
basically a computer inside your mobile phone
none behave crazy.
Ah, with your mobile device, like mobile phone or tablet or something.
don't use public charges or on secure public WiFi.
these things are No, no.
Unless you have some kind of protection
or it the thing I'm going to talk about in the future videos of this course.
Then the next thing you shouldn't do
is never open the mail that looks like a phishing email. You should you are responsible to learn how to recognize them. If you work in a company, you should probably get some kind of training if you don't ask for it
and tell somebody for my tea. Okay, guys, can you give us give me or
me and my colleagues that work together in my team?
Can you explain to us how the phishing email looks, how to recognize them and how to avoid them?
And the last thing is, don't you simple or generic passwords?
So, uh, we're not talking about some kind of password that is used for unlocking your phone. I'm talking about, For example, your email account passwords.
simple. Ordinary passports are easy to crack
and there is a rule of thumb been in creating passwords, which is the longer it is safer, it is.
So, uh, here is an example, very bad. And the really good password
And the 1st 1 it doesn't matter that it's, ah that I have replaced letters with numbers and I have played with
capital and the lower case letters.
The one the 1st 1 is not safe. The 2nd 1 is no longer a password. It is what we call pass phrase.
It's actually a sentence. It can have spaces as well.
Andi, it's something that you can easily remember,
but its long enough for a hacker to make for them to make it difficult to crack.
Also, if you know a second language, you can add something in debt language as well in your password,
which makes it extra extra protected.
So this is about you
now. I T and I t Security have responsibility as well, and there are a couple of them.
So 1st 1 is to install won T virus, anti malware and all software needed to protect your device. So basically,
they need to fill your device with all the software needed to make your device safe as much as it is possible.
The other thing is, they need to configure your device so it cannot be so. Basically,
they are like like mechanics that need to tinker with your device
and make it more secure.
So there are things for them. Police feats of PC. There are ways to protect the PC. One of the first things that I'm going to mention is your Every PC has bias, and they need to add by spots for to the device.
And of course, they have to make sure that allowed the security updates are regularly installed and stuff like that. So
it's a process, and your mobile devices have to be updated that they can do it. They can do the updates so that you don't even see they can be installed in background and months you restart your device, it's working.
you need a mechanic for your moment device
and the last time the thing they have to do they should be doing Sometimes they don't is to give you instructions on things you shouldn't be doing your with your mobile device and things you have to do with your mobile device to make it secure. So the things that have been talking about
in the previous slide that were you have seen the things you shouldn't do
with your mobile device. There are details to it. And if you're using a company mobile device regardless, if it's a tablet or mobile phone or notebook, there should be some kind of training devised for you so that you can look it online or you have can have a real life
coach trainer telling you how to do these things. In best case, there should be a test and the end so that they can check if you have bean being attention and actually learned something from the training.
So these are the responsibilities of different people in your company. If you're using company phone
and at the end of this lesson, just a reminder that
in this video have learned what are your employer's responsibility if you're using company device and what are your responsibilities and these are the most important ones.
End User Cyber Fundamentals
This End User Cyber Fundamentals course covers Internet risks such as typosquatting, website spoofing, drive-by ...
2 CEU/CPE Hours Available
Certificate of Completion Offered
Android Development Fundamentals
Android users dominate the mobile market, so the demand for Android developers is high. This ...
4 CEU/CPE Hours Available
Certificate of Completion Offered