Time
8 hours 33 minutes
Difficulty
Beginner
CEU/CPE
9

Video Transcription

00:06
mobile devices, specifically, smartphones and tablets need to have precautions taken to protect the integrity and confidentiality of the information stored on them.
00:15
Best practices for securing the information on these devices are very similar to their predecessors, desktops and laptops. Access to data on the device needs protected. The data should be backed up and softer, and the device kept patched and updated.
00:30
Mobile devices are targets for theft because they could be expensive, Easy to resell on their small size makes them a quick lift for thieves.
00:37
The best case scenario when the phone is stolen is that the owner locked the device.
00:42
It's harder for thieves to gain access to information on the device if it is locked or encrypted.
00:48
Some mobile devices are set to lock by swiping or other defined action, while many will auto lock after the device is inactive for a certain amount of time,
00:57
there may be many screen lock options, pass code or pin fingerprint or face skins.
01:03
Passcodes and pins are a group of numbers selected by the user
01:07
for android devices. It is set under the security settings screen lock.
01:11
The vice encryption is enabled by selecting encrypt phone in the security menu
01:15
with Apple IOS. The pass code is set under touch and pass codes in settings.
01:21
When a passcode is set for an IOS device, full device encryption is enabled.
01:26
Fingerprint face and iris locks are biometric authentication methods, which uses the owners unique physical features to unlock the device.
01:34
An Android Devices fingerprint authentication is set up under security settings
01:40
with apple IOS devices. This option is under Touch I D and Pasko's in settings.
01:45
Once a fingerprint has been saved, the device can be unlocked with a simple touch.
01:49
Failed log in restrictions prevents limitless guesses of credentials to unlock a device. Some Android devices have a maximum number of failed log in attempts of 10. Once that number has been reached, the device requires a restart.
02:02
If failed attempts continue, the device will automatically wipe itself
02:07
for IOS devices. The field log in restriction is six. After six failures, a minute must pass before attempting again.
02:14
The time out increases each time a failed passcode is entered.
02:17
Multi factor authentication as an extra layer of applications security by requiring a combination of two or more methods of authentication, something you know something you have or something. You are
02:30
a user name and password with the fingerprint is an example of something you know and something you are.
02:36
Applications like Gmail used to factor to authenticate users after entering a user name and password for an account, a code is sent via text message that must also be interred before access is granted.
02:46
There are authenticator APS available to provide a second form of authentication.
02:51
Google Authenticator is an app that generates rotating codes and used for both Android and IOS devices.
02:58
APS, to help users find their missing phone, have become very popular.
03:01
Thes APS will provide location information for a lost or stolen phone.
03:06
In addition, many have a remote white feature to delete data from the missing device. By a separate device,
03:12
the device needs to have Internet connectivity in order to provide its location or receive a remote wipe delete command.
03:17
Apple IOS devices used the find my phone app, which must be set up and enabled prior to the loss.
03:23
The APP can identify the exact location of the device with additional options to get the phone to play sound, erase data from the device or enable lost mode, which locks the device
03:35
the same find. My phone functions can be performed from the iCloud website.
03:38
Android devices have similar capabilities to locate a device with location and find my device applications.
03:46
Google find my device website or Google's find my device app can also be used to locate the device
03:53
in the event a device is lost or stolen or even a physical device failure. Having a backup of the data will prevent loss and Aidan quick recovery.
04:01
Backing up data on mobile devices can be done by connecting the device to a desktop system or by using online cloud storage
04:09
apples. Cloud service is accessed through the iTunes app or initiated through the devices backup settings.
04:15
The service is free up to a certain amount of space.
04:18
Android devices back up remotely using Google's cloud service.
04:23
Some files, such as contacts, email and AFT data, are backed up automatically.
04:28
Other files, like music and photos, need backed up manually.
04:31
And just like traditional workstations, mobile devices should be current on system updates, patches and anti virus software.
04:39
IOS App Store and the Androids place door are trusted sources for obtaining antivirus APS
04:45
research. The many AP options and reviews left by users.
04:48
Apple specialists believe IOS devices do not need anti virus protection if systems are updated regularly because IOS devices that are configured as intended by Apple run APS in a sandbox, which limits the apse access to the rest of the system.
05:03
Mobile devices receive notifications when updates and patches are available, but not necessarily at a convenient time
05:11
to install updates manually. At a desire time, IOS users can retrieve updates through settings General and then software update
05:19
available. UPDATES will be listed.
05:21
Android users can check for updates under settings about device and then system updates,
05:28
keeping mobile devices updated and patched, backing up their data and restricting access to the device. Our security best practices
05:35
following these recommendations can help protect the integrity and confidentiality off the data stored on them.

Up Next