How would you suggest that mobile devices be secured?

What will be an ideal response?

Because of their small size and high value, mobile devices are tempting targets for thieves and industrial spies. Because these issues are so important in today’s interconnected world, the following suggestions should all be considered. Although the following suggestions are intended as a checklist for mobile device security, many of them also apply to desktop workstations.
• Select an operating system, such as Windows 8, that allows secure logons, BIOSlevelpasswords, and strong firewall protection. You can also select hardwarethat allows you to require BIOS-level passwords. Also, log on and work with auser account that has limited privileges rather than an administrator account,and mask the administrator account by giving it a different name that would behard for a casual intruder to guess.
• Mark or engrave the computer’s case with the company name and address, or attach a tamper-proof asset ID tag. Many hardware vendors allow corporate customers to add an asset ID tag in the BIOS. For example, after powering up, you might see the message: Property of SCR Associates – Company Use Only. These measures might not discourage a professional thief, but might deter a casual thief, or at least make your computer relatively less desirable because it would be more difficult to use or resell. Security experts also recommend that you use a generic carrying case, such as an attaché case, rather than a custom carrying case that calls attention to itself and its contents. Also be sure to complete and submit all manufacturer registration cards.
• Consider devices that have a built-in fingerprint reader, such as the laptopfingerprint scanner shown in Figure 12-26.
• If your notebook is stolen, the call-in identifies the computer and itsphysical location. Armed with this information, the security tracking center canalert law enforcement agencies and communications providers. As shown inFigure 12-27, Absolute Software sells a product called LoJack for Laptops, whichoffers call-in service, as well as a remote data erase capability. Some versions of theproduct even provide a payment if the firm does not recover your stolen laptop.
• While traveling, try to be alert to potential high-risk situations, where a thief, orthieves, might attempt to distract your attention and snatch your computer. Thesesituations often occur in crowded, noisy places like airport baggage claim areas,rental car counters, and security checkpoints. Also, when traveling by car, storeyour computer in a trunk or lockable compartment where it will not be visible.
• Establish stringent password protection policies that require minimum lengthand complexity, and set a limit on how many times an invalid password can beentered before the system locks itself down. In some situations, you might wantto establish file encryption policies to protect extremely sensitive files.

Computer Science & Information Technology

You might also like to view...

The location that allows you to adjust mouse settings and optimize your visual display is known as the:

A) Ease of Access Center B) programs list C) notification area D) status area

Computer Science & Information Technology

A(n) ________ is the tool which appears in a separate window and displays all available options to show or hide data for a field

Fill in the blank(s) with correct word

Computer Science & Information Technology