Summary
In this chapter, we learned about the impacts of the mobile device on the end user. This is a very big topic for managers and administrators. The important point for end users is that you can be forced to follow specific rules on your device; yes, even the device that you really own. Bring Your Own Device does not really mean that you can use it for anything on a corporate network. Some of the items we discussed in this chapter included:
- What is MDM and how does it impact you
- Why do companies use MDM solutions
- What rules can be applied (such as passwords) and how you can be locked out
- We discussed what jailbreak means
- Also we reviewed a few MDM solutions that may be used at your company
- Acceptable use policies were reviewed and why you may need to sign one if you want to use your device on your company's network
- Power users were defined and some of the risks were identified; not all power users are the same
- Finally, we learned about some power user tools (or administrators) that may be used to help manage your device
In the next chapter we will review privacy.
推薦閱讀
- Node Security
- 白話網(wǎng)絡(luò)安全2:網(wǎng)安戰(zhàn)略篇
- 網(wǎng)絡(luò)空間攻防技術(shù)原理
- Learning Python for Forensics
- Kali Linux Wireless Penetration Testing Cookbook
- 安全防御入門手冊
- CTF那些事兒
- 人工智能安全(精裝版)
- 從實(shí)踐中學(xué)習(xí)密碼安全與防護(hù)
- 網(wǎng)絡(luò)服務(wù)安全與監(jiān)控
- 華為Anti-DDoS技術(shù)漫談
- Manga Studio 5 Beginner's Guide
- Kali Linux無線網(wǎng)絡(luò)滲透測試詳解
- 數(shù)據(jù)恢復(fù)技術(shù)深度揭秘
- 黑客攻防從入門到精通:實(shí)戰(zhàn)篇(第2版)