Read the scenario below and then answer the following questions regarding wireless and mobile security. Nonhlanhla wants to have wireless access in the employee break room and conference room next to her office. However, her employer’s IT staff turns down her request for a wireless network. Nonhlanhla decides to take the matter into her own hands: she purchases an inexpensive consumer wireless router and secretly brings into her office and connects it to the wired network, thus providing wireless access to the employees in her area. Staff members in Nonhlanhla’s area have a Bring Your Own Device (BYOD) agreement and setup. These members do bring laptops, smartphones and tablets to perform the organisation’s duties. Use a plausible example to explain how mobile device management can enforce geofencing to secure mobile device app from the unauthorised access to network.
Read the scenario below and then answer the following questions regarding
wireless and mobile security.
Nonhlanhla wants to have wireless access in the employee break room and
conference room next to her office. However, her employer’s IT staff turns
down her request for a wireless network. Nonhlanhla decides to take the
matter into her own hands: she purchases an inexpensive consumer
wireless router and secretly brings into her office and connects it to the
wired network, thus providing wireless access to the employees in her area.
Staff members in Nonhlanhla’s area have a Bring Your Own Device
(BYOD) agreement and setup. These members do bring laptops,
smartphones and tablets to perform the organisation’s duties.
Use a plausible example to explain how mobile device
management can enforce geofencing to secure mobile device app
from the unauthorised access to network.
Step by step
Solved in 2 steps