Summary
In this chapter, we learned about the impacts of the mobile device on the end user. This is a very big topic for managers and administrators. The important point for end users is that you can be forced to follow specific rules on your device; yes, even the device that you really own. Bring Your Own Device does not really mean that you can use it for anything on a corporate network. Some of the items we discussed in this chapter included:
- What is MDM and how does it impact you
- Why do companies use MDM solutions
- What rules can be applied (such as passwords) and how you can be locked out
- We discussed what jailbreak means
- Also we reviewed a few MDM solutions that may be used at your company
- Acceptable use policies were reviewed and why you may need to sign one if you want to use your device on your company's network
- Power users were defined and some of the risks were identified; not all power users are the same
- Finally, we learned about some power user tools (or administrators) that may be used to help manage your device
In the next chapter we will review privacy.
推薦閱讀
- DevSecOps敏捷安全
- CTF實(shí)戰(zhàn):技術(shù)、解題與進(jìn)階
- 數(shù)據(jù)恢復(fù)方法及案例分析
- Learning Python for Forensics
- Learning Veeam? Backup & Replication for VMware vSphere
- 云原生安全技術(shù)實(shí)踐指南
- 隱私計(jì)算
- 信息安全導(dǎo)論(第2版)
- 解密數(shù)據(jù)恢復(fù)
- 情報(bào)驅(qū)動(dòng)應(yīng)急響應(yīng)
- 華為防火墻實(shí)戰(zhàn)指南
- 數(shù)據(jù)安全架構(gòu)設(shè)計(jì)與實(shí)戰(zhàn)
- 實(shí)用黑客攻防技術(shù)
- VMware vCloud Security
- 網(wǎng)絡(luò)空間安全法律問題研究