CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
2. Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of expertise Industry Certifications
PC Hardware
Network Administration
IT Project Management
Network Design
User Training
IT Troubleshooting
Qualifications Summary
Education
M.B.A., IT Management, Western Governor’s University
B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
5. Page 5
Since the inception of the
mobile device, loss and theft
have been a concern.
Just about everyone has either lost a mobile device
or had one stolen. In the early years, the major
concern was that your cell phone was going to be
used to call some foreign country or toll number and
you would get stuck with a large bill. Now, with the
advent of smart phones, tablets, and the portability
of data, much more may be at stake.
Secure the mobile device.
6. Page 6
Secure the mobile device.
– First line of defense.
» Passcode locks: usually a four-digit code that must be entered
to unlock the phone.
» Failed login restrictions: a user-determined action (erase
data) that occurs after so many failed login attempts.
» Locator applications: uses GPS and geotracking to pinpoint
the location of the device, especially useful in cases of theft.
» Remote backup applications: backing up data is always
crucial.
– Last line of defense.
» Remote wipe: many phone and mobile devices are set up to
receive a signal from the user that will wipe the device remotely
in case the device is unrecoverable.
» Remote backup applications: backing up data is always
crucial!
8. Page 8
As technology progresses,
more and more malware is
being developed for the
mobile device.
Originally there was not much demand for malware
on the mobile device; after all, what were you going
to get? Again, with the rise of the smart phone and
tablet, the stakes have become much higher.
Secure the mobile device.
9. Page 9
Secure the mobile device.
– First line of defense.
» User education: teach and practice safe habits.
» Patching/OS updates: keeping your device’s operating
system up to date can mitigate many threats and vulnerabilities
and helps to reduce the threat of malware.
» Trusted source: only acquire apps from trusted sources; be
aware that not all apps are created equal. The user is more
likely to receive malware from an Android app than an Apple
app.
» Remote backup application: backing up data is always
crucial.
– Second line of defense.
» Antivirus: as the popularity of mobile devices has increased so
has the market for antivirus. Unfortunately, given the nature of
mobile devices, the antivirus product almost has to be
specifically tailored for each operating system, device, and
sometimes even the service provider. Do your research before
installing an antivirus app.
10. Page 10
Secure the mobile device.
Passcode locks, login restrictions, locator applications, and frequent
backups are all first line defensive measures that should be taken. If all else
fails, there is always the remote wipe option. If you have to resort to this,
hopefully your backups are current.
Topic
Secure against loss or theft.
Summary
Safe mobile device habits, keeping the OS current, only installing apps from
trusted sources, and frequent backup are your first line of defense. Antivirus
apps are an option; however, due to the nature of mobile computing, they
can be rather specific. Do your research before installing.
Secure against malware.
12. This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.