From the course: IT Security Foundations: Core Concepts
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Protecting mobile devices
From the course: IT Security Foundations: Core Concepts
Protecting mobile devices
- [Instructor] Today's mobile devices are essentially a small computer designed to consume information. Because of an always-on connection and the amount of time spent on mobile devices, you should be aware of the threats, along with steps to take to secure your device. Mobile devices are small, and they can easily be lost or stolen. And passwords can be compromised. Because so many of us use mobile devices to connect to the world, it's best to be aware of some of the threats. Threats include phishing or vishing, which is voice phishing, spoofing, spyware, or connecting to an network when offered free Wi-Fi. So let's talk about how using an unsecured Wi-Fi network can be a security risk. Now, one of the ways a hacker will gather information is by using something called a man in the middle attack using a Wi-Fi Pineapple. Now, in the middle, you see that device right there. That's the Wi-Fi Pineapple. This is a…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.