# Implement Mobile Device Management ## Mobile Device Deployment Models - **Bring your own device (BYOD)** - **Corporate owned, business only (COBO)** - What companies should use, this phone is for WORK only - **Corporate owned, personally-enabled (COPE)** - **Choose your own device (CYOD)** - **Virtual desktop infrastructure (VDI)** - instead of a company laptop, you get a stripped down machine and then connect with that machine to a virtual machine, everything is done on the virtual machine ![[Pasted image 20230706105017.png]] ## iOS in the Enterprise - App development - Software development kit (macOS only) - App store - Device Enrollment Program - Volume Purchase Program - Developer Enterprise Program - iOS vulnerabilities and patch ## Mobile Access Control Systems - Smartphone authentication - Password - pin - swipe pattern - biometric - Screenlock - Context-aware authentication - Geolocation - Geofencing - within business building, don't need authentication ![[Pasted image 20230706105236.png]] ![[Pasted image 20230706105345.png]] ![[Pasted image 20230706105422.png]] ![[Pasted image 20230706105520.png]] ![[Pasted image 20230706105548.png]] # Implement Secure Mobile Device Connections ![[Pasted image 20230706105709.png]] ![[Pasted image 20230706105723.png]] ![[Pasted image 20230706105831.png]] - bluejacking - unsolicited bluetooth messages - Bluesnarfing - Getting data ![[Pasted image 20230706105924.png]] ![[Pasted image 20230706105931.png]] ![[Pasted image 20230706105949.png]] - juice jacking - think your charging but its actually doing malicious stuff ![[Pasted image 20230706110023.png]] ![[Pasted image 20230706110033.png]] ![[Pasted image 20230706110105.png]]