2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet349/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   345   346   347   348   349   350   351   352   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Inventory Control
The term 
inventory control
may describe hardware asset tracking (as discussed in the previ-
ous topic). However, it can also refer to the concept of using a mobile device as a means of 
tracking inventory in a warehouse or storage cabinet. Most mobile devices have a camera. 
Using a mobile device camera, apps that can take photos or scan bar codes can be used to 
track physical goods. Those mobile devices with RFID or NFC capabilities may be able to 
interact with objects or their containers that have been electronically tagged.
Mobile Device Management
Mobile device management (MDM)
is a software solution to the challenging task of man-
aging the myriad mobile devices that employees use to access company resources. The goals 
of MDM are to improve security, provide monitoring, enable remote management, and 
support troubleshooting. Many MDM solutions support a wide range of devices and can 
operate across many service providers. You can use MDM to push or remove apps, manage 
data, and enforce configuration settings both over the air (across a carrier network) and 
over Wi-Fi connections. MDM can be used to manage company-owned devices as well as 
personally owned devices (such as in a bring your own device [BYOD] environment).
Device Access Control
A strong password would be a great idea on a phone or other mobile device if locking the 
phone provided true security. But many mobile devices aren’t secure, so even with a strong 


370
Chapter 9 

Security Vulnerabilities, Threats, and Countermeasures
password, the device is still accessible over Bluetooth, wireless, or a USB cable. If a specific 
mobile device blocked access to the device when the system lock was enabled, this would be 
a worthwhile feature to set to trigger automatically after a period of inactivity or manual 
initialization. This benefit is usually obtained when you enable both a device password and 
storage encryption.
You should consider any means that reduces unauthorized access to a mobile device. 
Many MDM solutions can force screen-lock configuration and prevent a user from dis-
abling the feature.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   345   346   347   348   349   350   351   352   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish