10

Technologijos

Embed Size (px)

DESCRIPTION

Apie technologijas

Citation preview

  • Mobile security refers to efforts to secure data on mobile devices such as smartphones and tablets. Typically, mobile security is something that enterprises work on to control sensitive information*

  • *Smart phoneTablet

  • Keep tabs on your devices

    Dont leave your smartphone or tablet unattended at an Internet cafe or on planes, trains and automobiles.Set a strong password

    After ensuring the physical safety of your phone or tablet,the next step is to make sure you have a hard-to-crack login passwordWatch that Wi-Fi

    Another big tablet security risk is browsing the Web on a public Wi-Fi hotspot or any unknown or untrusted wireless network. . If you have access to a VPN (virtual private network), use it*

  • Apply a lock-screen password. This is particularly important if youre using a modern Android device where the drag-to-start feature looks amazing

    Dont Jailbreak your iPhone or root your Android

    Avoid non-secure access points

    Avoiding untrusted apps

    *

    Therefore, you must have a security strategy that is complete and able to encompass technology changes.*

  • GSM uses the Subscriber Identity Module (SIM)SIM is a smart card it has:

    A processorNon-volatile memoryProcessor is used for providing access to the data and security*

  • Every mobile and smart phone users used smart card called a Subscriber Identity Module (SIM)

    As physical evidence the SIM provides details printed on the surface of;

    Name of the Network ProviderUnique ID Number*

  • *Every SIM can be protected by a Personal Identification Number (PIN)

    Can be changed by the SubscriberFour digit codeUsually 3 attempts before phone is blocked

    Bypassing the PIN requires the Pin Unblocking Key (PUK)

    8 digit codeMaximum 10 attempts before phone is permanently blocked

  • *

    Organization can also use a management product with its own app store*

  • *

    Therefore, you must have a security strategy that is complete and able to encompass technology changes.*Organization can also use a management product with its own app store*