Explain using a realistic example how mobile device management may impose geofencing to protect mobile device apps from unauthorised access to the network in order to secure mobile device apps.
Take a look at the situation below and then respond to the questions that follow about wireless and mobile security.
Nonhlanhla would want wifi connectivity in the staff break area and conference room adjacent to her office, as well as in her office itself. Her request for a wireless network, on the other hand, is denied by her employer's information technology team. After considering her options, Nonhlanhla decides to take matters into her own hands. She purchases a low-cost consumer wireless router, which she takes into her workplace and connects to the wired network, thus giving wireless access to the workers in her immediate vicinity.
Employees in Nonhlanhla's region have signed a Bring Your Own Device (BYOD) agreement and have their devices set up. These members do, however, bring laptop computers, cellphones, and tablets with them in order to carry out the responsibilities of the organization.
Explain using a realistic example how mobile device management may impose geofencing to protect mobile device apps from unauthorised access to the network in order to secure mobile device apps.
Step by step
Solved in 2 steps