Description could include the following:
- Screen locks
- Fingerprint lock
- Face lock
- Swipe lock
- Passcode lock
- Remote wipes
- Locator applications
- Remote backup applications
- Failed login attempt restrictions
- Antivirus/anti-malware
- Patching/OS updates
- Biometric authentication
- Full device encryption
- Multifactor authentication
- Authenticator applications
- Trusted sources vs. untrusted sources
- Firewalls
- Policies and procedures
- Bring your own device (BYOD) vs. corporate owned
- Profile security requirements
Process/Skill Questions:
- What method(s) have you used to secure your own mobile device(s)?
- What is the danger when personal mobile devices are allowed into high-security facilities?
- What additional security methods could be configured on a mobile device?