Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
An Introduction on Design and Implementation on BYOD and Mobile Security

An Introduction on Design and Implementation on BYOD and Mobile Security

Ratings: (0)|Views: 404|Likes:
Published by Sina Manavi
Agenda :
What are mobile devices?
Mobile device threads
BYOD
BYOD Pros and Cons
4 Steps to design BYOD:
BYOD Strategy
Mobile Hacking techniques demo:
Android Phone
Mobile Application Security
Laptop
Pendrives
BYOD or BYOA
How to Secure the data storages and transportation

Agenda :
What are mobile devices?
Mobile device threads
BYOD
BYOD Pros and Cons
4 Steps to design BYOD:
BYOD Strategy
Mobile Hacking techniques demo:
Android Phone
Mobile Application Security
Laptop
Pendrives
BYOD or BYOA
How to Secure the data storages and transportation

More info:

Categories:Types, Presentations
Published by: Sina Manavi on Feb 15, 2014
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PPTX, PDF, TXT or read online from Scribd
See more
See less

03/28/2014

pdf

text

original

 
Sina Manavi 13Feb 2014
 
BYOD AND MOBILE SECURITY
 
My name is Sina Manavi , Master of Computer Security and Digital Forensics CEH and CHFI Certificate Holder Contact : Manavi.Sina@gmail.com
 ABOUT ME
 
 What are mobile devices?
Mobile device threads
BYOD
BYOD Pros and Cons
4 Steps to design BYOD:
BYOD Strategy
Mobile Hacking techniques demo: 1. Android Phone 2.Mobile Application Security
3.Laptop 4.Pendrives
 AGENDA
BYOD or BYOA
How to Secure the data storages and transportation

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->