1. OBJECTIVE
To manage and control corporate information on mobile devices, it is necessary to establish mechanisms that protect the connection and access to data wherever the user is.
In this experiment, you will practice one of the many ways to manage mobile devices in order to protect both the devices and the business information on those devices.
In this practice, we will focus on the implementation of strategies to ensure security in the use of mobile devices by company employees.
At the end of this experiment, you should be able to:
judge the need to create rules for blocking and controlling mobile devices;
implement security rules for using mobile applications.
2. WHERE ARE THESE CONCEPTS USED?
Mobile devices have become work tools, being usually used to send and receive data and important information from the company. Given this, it is essential that the user and security managers employ ways to protect the device and the information that passes through it.
3. THE EXPERIMENT
In this experiment, you will use a tool in the virtual lab that will simulate actions for configuring and implementing security rules for mobile devices. In this simulation, you will employ the concepts of: mobile device management system (MDM); HTTP (Hypertext Transfer Protocol) and HTTPS (Hypertext Transfer Protocol Secure); device content management; and mobile device data protection.
4. SECURITY
Rules for safe internet access must be observed, not using real information for the experiment. The information presented by the simulation during the exercise should also be observed.
5. SCENARIO
The scenario for the development of this experiment is the virtual laboratory environment, in which it will be possible to simulate a real environment of actions for the protection of mobile devices and their data, using the simulation in a virtual smartphone and employing the concepts of MDM.
To manage and control corporate information on mobile devices, it is necessary to establish mechanisms that protect the connection and access to data wherever the user is.
In this experiment, you will practice one of the many ways to manage mobile devices in order to protect both the devices and the business information on those devices.
In this practice, we will focus on the implementation of strategies to ensure security in the use of mobile devices by company employees.
At the end of this experiment, you should be able to:
judge the need to create rules for blocking and controlling mobile devices;
implement security rules for using mobile applications.
2. WHERE ARE THESE CONCEPTS USED?
Mobile devices have become work tools, being usually used to send and receive data and important information from the company. Given this, it is essential that the user and security managers employ ways to protect the device and the information that passes through it.
3. THE EXPERIMENT
In this experiment, you will use a tool in the virtual lab that will simulate actions for configuring and implementing security rules for mobile devices. In this simulation, you will employ the concepts of: mobile device management system (MDM); HTTP (Hypertext Transfer Protocol) and HTTPS (Hypertext Transfer Protocol Secure); device content management; and mobile device data protection.
4. SECURITY
Rules for safe internet access must be observed, not using real information for the experiment. The information presented by the simulation during the exercise should also be observed.
5. SCENARIO
The scenario for the development of this experiment is the virtual laboratory environment, in which it will be possible to simulate a real environment of actions for the protection of mobile devices and their data, using the simulation in a virtual smartphone and employing the concepts of MDM.
Show More