# Implement Mobile Device Management
## Mobile Device Deployment Models
- **Bring your own device (BYOD)**
- **Corporate owned, business only (COBO)**
- What companies should use, this phone is for WORK only
- **Corporate owned, personally-enabled (COPE)**
- **Choose your own device (CYOD)**
- **Virtual desktop infrastructure (VDI)**
- instead of a company laptop, you get a stripped down machine and then connect with that machine to a virtual machine, everything is done on the virtual machine
![[Pasted image 20230706105017.png]]
## iOS in the Enterprise
- App development
- Software development kit (macOS only)
- App store
- Device Enrollment Program
- Volume Purchase Program
- Developer Enterprise Program
- iOS vulnerabilities and patch
## Mobile Access Control Systems
- Smartphone authentication
- Password
- pin
- swipe pattern
- biometric
- Screenlock
- Context-aware authentication
- Geolocation
- Geofencing
- within business building, don't need authentication
![[Pasted image 20230706105236.png]]
![[Pasted image 20230706105345.png]]
![[Pasted image 20230706105422.png]]
![[Pasted image 20230706105520.png]]
![[Pasted image 20230706105548.png]]
# Implement Secure Mobile Device Connections
![[Pasted image 20230706105709.png]]
![[Pasted image 20230706105723.png]]
![[Pasted image 20230706105831.png]]
- bluejacking
- unsolicited bluetooth messages
- Bluesnarfing
- Getting data
![[Pasted image 20230706105924.png]]
![[Pasted image 20230706105931.png]]
![[Pasted image 20230706105949.png]]
- juice jacking
- think your charging but its actually doing malicious stuff
![[Pasted image 20230706110023.png]]
![[Pasted image 20230706110033.png]]
![[Pasted image 20230706110105.png]]