Security in a complex world
Analyze network security threats, risks, and solutions presented by mobile devices in BYOD workplaces.
Do the following:
Analyze three common security threats for enterprises employing a BYOD policy.
Explain the risk factors associated with mobile device security threats.
Analyze how two significant features of a specific mobile OS keep their devices secure.