Buying your device
Off to the mobile store you go; you are buying a mobile device today. You saw the advertisement on the TV and now you must have the new mobile phone/tablet. Now that you have the new device, you are ready to start reading your corporate e-mail and/or accessing the expense system. Being a five year employee at ACME Anvil Corporation, you know the head of the corporate e-mail system. You bring your new super tablet to your computer friend and tell him, "put our e-mail on my tablet, please!" As noted, Roger has been your working friend for many years and he is happy to help you. Roger tells you the following rules:
- You need to use a special Internet address:
www.mobile.example.com/mailsystem
- Once you connect to your company server, you may need to use your normal username and password (or a special one that was provided by Roger) that you use to connect your PC to the network when you come to work.
- Roger may also say, "Use your one time use Personal Identification Number (PIN) that I will give you in order to get to the corporate cloud".
- If you lose your device; "Tell me as soon as possible. I will need to wipe it. (remove all the e-mails or all the device contents)", Roger tells you.
- You will be forced to put a device password on your device/tablet.
At this point you stop and ask Roger, "What device password?"
Roger answers your question, by saying, "Now, this gets interesting. Have you ever heard of Mobile Device Management?"
- 科技安全:戰略實踐與展望
- 開發者的Web安全戒律:真實威脅與防御實踐
- 黑客攻防與無線安全從新手到高手(超值版)
- Learning Devise for Rails
- Building a Home Security System with BeagleBone
- 信息安全等級保護測評與整改指導手冊
- 數據安全與流通:技術、架構與實踐
- 編譯與反編譯技術實戰
- CTF特訓營:技術詳解、解題方法與競賽技巧
- VMware vCloud Security
- 網絡服務安全與監控
- Mastering Python for Networking and Security
- 網絡安全監控實戰:深入理解事件檢測與響應
- 紅藍攻防:技術與策略(原書第3版)
- Kali Linux無線網絡滲透測試詳解