Professional Documents
Culture Documents
Desktop systems don't have to worry too much about power use, they essentially have an endless supply
of energy through the wall outlet. And while a component that consumes less power is beneficial for your
energy bill, it's not really a necessity with desktop systems. However, the same can't be said about
notebooks.
Notebooks are designed to be portable and run on battery power for extended periods of time. If the
notebook used energy the same way a desktop did, it would either need a huge battery or only run for
about five minutes unplugged. Neither of these options would work, instead, notebooks use two
techniques to prolong battery life.
First, they use specially designed, low-power mobile components, such as mobile processors, mobile
GPUs, and low-power hard drives, these components consume much less power than their desktop
counterparts.
The first type of power management tool used by computers was called Advanced Power Management,
or APM.
APM is a legacy power management tool that's rarely used anymore, in fact, only certain versions of
Linux even support it. With APM, instead of the operating system controlling hardware, the BIOS was
responsible for controlling hardware. This meant that the BIOS could do things like turn off a hard drive
without the operating system even knowing. This also prevented the operating system from receiving real-
time statistics about hardware components. APM had several other inherent flaws, as such, modern
systems now use the ACPI standard.
The second technique is actually an operating system feature that's used by both desktop and notebook
systems called Advanced Configuration and Power Interface, or ACPI.
ACPI is used by operating systems to communicate directly with hardware components and allows the
OS to discover, configure, monitor and manage the power of hardware components.
With ACPI, hardware configuration settings are controlled entirely by its operating system. This is known
as Operating System-Directed Configuration and Power Management, or OSPM. How ACPI works is the
operating system receives real-time statistics about how much power each hardware component is using.
The operating system then uses this information to decide whether it should leave it alone, reduce the
amount of power it's consuming, or shut it down entirely.
For example, let's say the operating system notices that its secondary hard drive hasn't been accessed in
over an hour, the operating system decides that the hard drive probably doesn't need to be on, so it
powers it off, now let's say another hour passes and the computer needs to access a file on that hard
drive. The operating system then powers the hard drive back on so the file can be accessed. This does
cause a bit of a delay in accessing the file, but the operating system was able to save energy by not
powering the drive for an hour.
Another example might be with a CPU. Let's say the operating system notices that only 30% of the CPU's
potential is being used. To save energy, the operating system decides to reduce the voltage to the CPU.
Since the CPU isn't being used heavily, this performance reduction isn't even felt by the user. If the CPU
suddenly needs to do more processing, the operating system can simply increase the voltage to the CPU
and increase its performance capability.
Now these are examples with individual components, but ACPI is also able to make system-wide power
management changes, and it does this based on the ACPI power state.
The first ACPI power state is On. When in this state, all power management functions are off, all devices
are running at full power and no power management is taking place.
The second power state is Enabled. In the Enabled state, power management is turned on but no devices
are shut down.
The third power state is Standby, during Standby, the CPU is shut down, however, RAM retains its
contents. In addition, all peripheral devices are also shut down.
The fourth power state is Suspend, with Suspend, everything in the computer is shut down except for
RAM. Because the RAM still has power, the contents are retained, however, everything else gets shut off.
The fifth power state is Hibernate. When a computer is in this state, everything is shut off in the computer,
even the RAM, however before the RAM and CPU lose power, their contents are transferred to the hard
disk drive, and then this system is shut down. When the system is powered back on, the information
saved from the CPU and RAM are loaded back into the hardware components and the system resumes
exactly where it left off. When used with notebooks, ACPI can extend the battery life by a considerable
amount, if certain components haven't been used in a while, they can be shut off or suspended until they
are needed again. ACPI can also control the power use of plug and play devices such as portable hard
drives. Notebooks can also take advantage of the different power states offered by ACPI, for example, if
you need to travel from one location to another, you can quickly Hibernate the notebook, move locations,
and then pick up exactly where you left off.
Summary
It's also possible to configure ACPI to automatically enter certain power states after a specified period of
inactivity.
Notebook systems are designed to use as little power as possible. Common ways notebook
systems save power are:
When your laptop is plugged into the wall, it is receiving power through an adapter that
converts the AC power from the outlet to DC power usable by the computer. Most adapters can
be used on both 110 and 220 AC volt power sources. The energy received through the adapter
is divided between running the notebook system and charging the battery.
Remember that most adapters are not interchangeable between laptops because laptops
require varying amounts of voltage and amperage and also have different plugs. Before
connecting a laptop to an adapter, look at the information listed on the adapter to make sure
that it supplies the correct amount of voltage and amperage necessary for your specific laptop
and has a plug that will fit properly. Failing to use the correct adapter can cause a laptop to:
When a laptop is not plugged into the wall, it receives its power from the battery. Batteries wear
out over time so you should expect to replace your battery every few years. It is best to never
let a battery run extremely low because the life of a battery significantly decreases if it loses all
of its charge. The following table lists the battery types that might be used in portable devices:
Battery Characteristics
Nickel Metal
Hydride Does not develop a memory
40% longer lifetime than Nickel Cadmium
Cannot be overcharged
ACPI is also known as Instant Available and Always On. Is often mistakenly referred to as
APM (an older standard).
Users can configure settings that identify events and power consumption
characteristics. For example, you can configure the display to turn off after 5 minutes
of inactivity.
The system can monitor the battery and other device states and dynamically change
power consumption on one or more devices.
ACPI standardizes a number of power states as are listed in the table below:
Power on
Enabled
Nothing is shut down
CPU is off
Suspend
RAM retains contents
All other components are off
Windows uses Power Schemes to manage power for the system. A power scheme is a collection
of power settings that are either predefined or created by a user for use in different computing
environments.
Each power scheme controls power down settings for the monitor, hard drives, and the
entire system, and has settings for when running on AC power or on battery power.
You can modify the existing schemes or create new ones to meet your needs through
the Power Options utility in the Control Panel. In Windows 10, you can edit power
schemes by right-clicking on the desktop, selecting Display Settings > Power & Sleep.
The preconfigured power schemes available depend on the operating system version
and the computer type (laptop or desktop). Some manufacturers also include
preconfigured power schemes. Default power schemes are often included to maximize
performance or power savings.
Edit the power scheme to control what the device does when you press the power
button, shut down the system, or close the laptop lid.
In Windows, sleep corresponds to the suspend ACPI state. With hybrid sleep, data in
memory is retained as well as written to the hard disk. If the computer is turned off
while in hybrid sleep, it can be resumed using the data stored on disk.
Power management must be supported by the BIOS, devices, and the operating system.
In Windows, hibernation must be enabled before you can select Hibernate as an option
for shutting down the system or in a power scheme.
The BIOS must have ACPI support enabled before you can enable hibernation in
Windows. If the Hibernate tab is missing, check the BIOS. If the BIOS does not have a
setting for ACPI, you might need to upgrade the BIOS.
By default, Windows is allowed to control power to all devices that support the feature.
You can edit the device properties in Device Manager to prevent Windows from
controlling the device.
The Wake on LAN (WoL) feature allows a device that receives a special network signal to
wake the computer from a sleeping or hibernated state. WoL is often used by desktop
administrators to remotely start up computers for management purposes.
o By default, devices are not allowed to wake the computer, although they might
support this feature.
o Edit the device properties in Device Manager to allow a device to wake the
computer.
In today's world, mobile devices are becoming more of a necessity than a luxury. This is
especially true with smartphones, which are the most widely used mobile device.
In this lesson, we're going to spend some time looking at the different types of mobile devices you
need to be familiar with. We'll also take a look at the common characteristics that all mobile
devices share.
Let's start by looking at the different types of mobile devices you are most likely going to
encounter.
Smartphone
Probably the most common mobile device is the smartphone. Smartphones combine the
functionality of a cellular phone with the features of a desktop computer. When they were first
developed, they really were kind of limited in their functionality. However, smartphones have since
become some of the most powerful and versatile mobile devices.
Smartphones are able to access the internet either through a WI-FI connection or by using a 3 or
4G cellular connection. They can also be used as a GPS navigation unit, a portable gaming
device, and a mobile music player. Smartphones typically have a screen size between 2.5 inches
and 5 inches.
Tablet
The next type of mobile device is a tablet. Tablets were some of the first types of handheld mobile
devices. They typically have more computing power than smartphones, but are also a lot larger
and more expensive. A typical tablet screen size is between 10 inches and 15 inches.
Tablets are designed as a type of notebook replacement. While they aren't as powerful as a
notebook system, they tend to be more portable, have a longer-lasting battery, and have much of
the same productivity tools available to them. Most tablets can even connect to a wireless
keyboard to allow for easier typing.
Phablet
There's another mobile device that's sort of a hybrid between a smartphone and a tablet. This
device is called a phablet. Phablets aren't as small as a smartphone, but aren't as powerful as a
tablet. They're somewhere in between. Phablets usually have a screen size between 5.2 inches
and 7 inches. In fact, any smartphone with a screen bigger than 5.2 inches is technically a
phablet, not a smartphone.
Most phablets are able to use special stylus pens to interact with the device. This allows for more
accurate screen tapping for things like writing notes, drawing diagrams or navigating apps.
The next mobile devices we'll look at are actually a family of mobile devices that are meant to be
worn on the body. As such, these are called wearable technology devices, or simply wearables.
Wearable Devices
Wearables are a type of mobile device that is meant to be worn somewhere on the body. These
devices range from being as simple as a step-tracking wristband to as complex as a virtual reality
headset. Most wearable devices are designed to interface with another device.
For example, a smartwatch by itself has a limited set of functionality. However, smartwatches are
designed to connect to smartphones using Bluetooth. Doing this unlocks additional functionality,
such as reading texts or answering phone calls through the smartwatch.
E-reader
Now, whether it's a tablet, smartphone or an e-reader, all mobile devices share some common
characteristics, the most common of which is its power source.
Now, as their name implies, mobile devices need to be mobile. This means they need to have
some sort of mobile power source. This source is typically a lithium ion battery. Lithium ion
batteries are rated in milliamp hours. The larger the number, the greater the battery capacity. For
example, the average smartphone battery is about 2,000 milliamp hours, whereas a notebook
battery is about 6,000 milliamp hours.
Mobile Storage
Mobile devices also need to be able to have mobile connectivity to the internet and other types of
mobile devices. To do this, mobile devices use a variety of wireless connection mediums. For
example, the typical smartphone uses 802.11 Bluetooth and cellular wireless technologies. Some
mobile devices might only use 802.11 wireless or only Bluetooth, but a lot of mobile devices use
multiple wireless mediums.
Internal Sensors
Mobile devices also have some sort of internal sensor that collects environmental data. A
common example of this is a GPS chip. Mobile devices use GPS chips in order to calculate the
device's location information. This is helpful for things like navigation applications and device
location services.
Another internal sensor that mobile devices use is called an accelerometer. An accelerometer is a
sensor that detects movement on a single plane. In mobile devices, this is typically the horizontal
plane. This is actually the device that detects when a mobile device is turned sideways and tells
the device to change the screen's orientation.
A third sensor used by mobile devices is called a gyroscope. A gyroscope also detects
movement, but it does so a bit differently than an accelerometer. Instead of detecting movement
on a single plane, a gyroscope detects horizontal and vertical movements. If you've ever played a
game on a smartphone or tablet that requires you to tilt the device, then you've used a gyroscope.
Touchscreen
The most common characteristic of a mobile device is its touchscreen. Because mobile devices
are designed to be extremely mobile, they typically don't use peripheral devices in order to use
the device. Instead, mobile devices use capacitive touchscreens to receive user inputs.
The reason mobile devices use capacitive touchscreens as opposed to resistive touchscreens is
because they are able to detect multiple contact points. For example, being able to zoom in on a
photo using two fingers is only possible because of the capacitive touchscreen. The one
drawback is the fact that capacitive touchscreens require a conductive object to touch the screen,
so a gloved hand won't be able to manipulate the screen.
Some mobile devices are also capable of using a special stylus to interact with the device. The
stylus looks very similar to a pencil or pen, but has a special tip that allows you to draw, write or
interact with the device much more accurately than is possible with a finger.
Mobile Operating Systems
Another characteristic of mobile devices is their operating system. Unlike notebooks, which use a
desktop operating system that contains mobile features, mobile operating systems are designed
specifically for mobile devices and with a touchscreen interface in mind. The three most common
mobile operating systems are Android, iOS, and Windows Phone. While there are actually several
more than these three, you really only need to be familiar with these ones here.
Now, often times, the decision between purchasing one mobile device over another is largely
based on the operating system they use, and the primary reason for this is due to the fact that
each operating system uses its own proprietary app ecosystem, which is another characteristic of
mobile devices.
App Ecosystem
Software programs that run on mobile devices are called apps. And mobile devices can only use
apps that have been written specifically for a particular mobile operating system. This means an
app written for an android won't be able to run on iOS and vice versa.
Because of this, each mobile OS has its own app ecosystem, which is a fancy way of saying the
number of apps that a particular mobile OS has available to it. For example, iOS uses the iOS
App Store, Android uses the Google Play Store, and Windows Phone uses the Windows Phone
Store.
Just like most things, each app ecosystem has pros and cons which are largely opinion-based.
The main thing to know is that when you purchase a particular mobile device, you are buying into
a specific app ecosystem.
One final thing you should be aware of regarding mobile devices is the fact that most of the
internal hardware components are non-serviceable. This means if, for example, the processor
fails, you have to purchase an entirely new device. It's sometimes not even possible to replace a
faulty battery in some mobile devices.
This actually touches on the fact that mobile devices are not designed as a complete solution.
They are instead designed to be a supplement to other computing devices. And while they do
have a lot of functionality and do a lot of things really well, they do have their limitations.
Summary
Okay, so that's it for this lesson. In this lesson, we looked at different types of mobile devices that
you should be familiar with. We also looked at the common characteristics that all mobile devices
share, such as power, storage, wireless connections, and touchscreens. And remember, mobile
devices use mobile operating systems that each use their own proprietary app ecosystem.
The following table lists the most common mobile devices you will encounter:
Device Description
E-readers are similar in size to tablets, but they lack the functionality of
a tablet. Their primary purpose is for reading digital books,
newspapers, magazines, and other periodicals. Most e-readers use E
ink to display digital content. E ink is a special technology that creates a
E-readers
high-contrast, black and white display. Even though they can only
display grayscale, E ink screens are great for e-readers because they
consume much less power than LCD screens and they don't suffer
from visibility problems when used in bright sunlight.
Some of the key features of mobile devices are shown in the following table:
Feature Description
iOS: AppStore
IMEI vs. IMSI IMEI stands for International Mobile Equipment Identity and is a
unique number given to every single mobile phone, typically found
behind the battery. IMEI numbers of cellular phones connected to a
GSM network are stored in the Equipment Identity Register
database containing all valid mobile phone equipment. When a
phone is reported stolen or is not type approved, the number is
marked invalid.
IMSI stands for International Mobile Subscriber Identity. This is a
unique identifier that defines a subscriber in the wireless world,
including the country and mobile network to which the subscriber
belongs. The IMSI is one of the pieces of information stored on a
SIM card.
Launcher is the name given to the part of the GUI that lets users
customize the home screen (e.g. the phone's desktop), launch
Launcher
mobile apps, make phone calls, and perform other tasks on Android
devices.
Operating Three operating systems are commonly used with mobile devices:
system
Android (open source)
Wi-Fi calling allows your iPhone to place and receive phone calls and
text messages over a Wi-Fi network. If you have a weak cellular
Wi-Fi calling signal but a solid Wi-Fi signal, your iPhone will automatically switch
over and route calls and texts using Wi-Fi. You can only use this if
your cellular carrier supports it.
Mobile phone accessories include any hardware or software that is not integral to the operation
of a mobile phone as designed by the manufacturer. Some mobile accessories are described in
the following table:
Accessory Description
Protective Protective covers or cases are designed to attach to, support, and
covers hold a mobile device. Protective covers are meant to protect a
mobile device from accidental drops, shock, and water.
Protective covers include:
Holsters
Shells
Skins
Bumpers
Leather Case
Credit card A credit card reader allows you to accept credit and debit cards
readers payments through your smartphone or tablet.
Connection
Description
Types
You can synchronize data between a PC system and a mobile device. You can also synchronize
data between your PC or mobile device and the cloud. Use a USB cable or wireless connection
to connect to a desktop or cloud to synchronize your data. You can also configure both a PC
and a mobile device to use the same iCloud account.
Online services use mutual authentication or single sign on to allow you to connect to their
servers to sync data. Mutual authentication, also called two-way authentication, is a process or
technology where both entities in a communications link authenticate each other. In a network
environment, the client authenticates the server and vice-versa. For example, iTunes requires
you to authenticate using your Apple ID to its servers, while at the same time, Apple verifies
that the iTunes app on your computer or device is the same app and computer used to access
your iTunes account. Mutual authentication is used for multiple services like purchasing music
and ebooks and saving content to the cloud.
Also, be aware of any software requirements needed to install the application on your PC or
mobile device. Some software require a specific operating system and cannot run on any other
operating system. For example, Android apps run only on Android devices. Apple apps run only
on devices with iOS.
Contacts
Programs
Pictures
Music
Videos
Calendar
Bookmarks
Documents
Location data
eBooks
You can configure email accounts on your mobile device using email service providers. Well-
known email providers include:
Exchange
Google/Inbox
iCloud
Outlook.com
Yahoo
You can also add your email account and setup the IP addresses of your POP3, IMAP, or SMTP
servers. To configure these email accounts, you may need to modify the port settings. To
encrypt your email, configure the SSL and S/MIME settings. Both SSL and S/MIME securely sign
and encrypt email. It is used to prove that the email came from the person says it is from.
Mobile devices are used for everything from making phone calls to managing bank accounts and
everything in between. As such, they pose a unique security threat. A single smartphone sometimes
contains more personal information than a desktop computer. And all that information is in a device that
can be lost essentially anywhere.
In this lesson, we're going to take a look at the various aspects of a mobile device security and the
different ways mobile devices can be protected.
Let's start by looking at the different authentication methods that mobile devices use. By default, most
mobile devices are configured to use a swipe lock screen. This means that anyone can unlock the device
with a simple swipe of the screen. There's no authentication at all. For obvious reasons, this isn't very
secure.
To secure access to a mobile device such as a tablet or a smartphone, it's important that you configure
the device's lock screen to use some sort of authentication. And there are actually several different types
of lock screen authentication methods, each with varying degrees of security strength.
Biometric
Some mobile devices support biometric authentication on lock screens. The two most common ones are
fingerprint and facial recognition. With fingerprint recognition, the index finger of the user is scanned and
used to unlock the device.
With facial recognition, the device's camera is used to scan the user's face and unlock the device. It may
seem pretty cool that mobile devices have this technology, and it really is. However, the technology is
somewhat lacking and can be fooled relatively easily. For example, a simple photo of the device's owner
can be used to trick facial recognition. And by printing a picture of the owner's fingerprint using a simple
laser printer, fingerprint recognition can be fooled. Because of this, biometric authentication probably
shouldn't be used for mobile devices that contain highly sensitive information.
PIN
Probably the most common lock screen authentication method is using a PIN. It's very similar to the
authentication method used by debit cards. The user needs to enter the correct four numbers in order to
unlock the mobile device.
Using a PIN for authentication's actually relatively secure. There are 10,000 possible combinations using
a four-digit PIN. And a PIN can be memorized very easily, reducing the need to write it down somewhere.
But a PIN does have some drawbacks. For example, a PIN can be shouldersurfed somewhat easily. A
person doesn't even need to see the exact numbers being pressed, simply the location of the press.
Pattern Unlock
Another method of screen authentication is specific to the mobile devices that use the Android OS and is
called pattern unlock. With this authentication method, the user creates a line pattern on a nine-point grid
which looks something this. To unlock the device, the user then has to provide the exact same pattern.
Pattern unlock is actually harder to shoulder surf than PIN authentication.
Passcode
The last method we'll look at is the passcode authentication, and it's potentially the most secure
authentication method. Passcode authentication uses a user-defined password to unlock the device. The
password can be a mix of letters, numbers, and symbols.
Now, I say it has the potential to be the most secure because, let's face it, some people don't put a lot of
thought into their passwords. So, if the passcode is 1-2-3-4, or the word "password," the device won't be
very secure.
So, we have all these lock screen authentication methods, all of which prevent someone from accessing
the mobile device. Well, what if someone really wants to get the information contained on the device?
What's to stop them from entering all 10,000 possible PIN combinations until the right one is found?
Luckily, most mobile devices are configured by default to only allow a set number of failed login attempts,
which is usually 10. If more than 10 failed logins are attempted, the mobile device will automatically wipe
the entire contents of the device and reset it to the factory defaults.
It's important to make sure that this feature is enabled on all mobile devices. This is one of the best lines
of defense you can provide to a mobile device. Even if the passcode or PIN aren't very secure, it will be
pretty hard to guess the right one with only 10 attempts at your disposal.
Device Encryption
Another line of defense that can be implemented and is used by default on most new devices is
encryption. Encryption prevents someone from accessing the stored information in any capacity. This
means even if someone gets ahold of a device and were somehow able to copy the content of the device,
they wouldn't be able to view any of the information. It would be encrypted.
There are two types of encryption methods used by mobile devices. The first is partial device encryption.
With this method, only the sections of the device's storage that contain files are encrypted. This type of
encryption is fast, but it doesn't encrypt deleted files, which can be recovered using software.
The second method is full device encryption. This method encrypts every single sector of the device's
storage, regardless of whether it is data or not. This protects the entirety of the device, including deleted
files.
If a mobile device doesn't encrypt contents by default, it's important to make sure that full device
encryption is enabled and configured.
There are two more security features used by mobile devices that you should be aware of, and they are
both used in situations where the device has been lost.
Remote Wipe
The first is called remote wipe. Remote wipe is used to remotely format a mobile device. It's a feature
that's built into a lot of mobile devices, especially smartphones, but it's also possible to use third-party
software, such as Windows Intune, to achieve this functionality. Remote wipe requires some sort of
connection to the device. This means, in order to send remote wipe command, the device needs to be
powered on and have cellular or Wi-Fi connection.
Device Locator
The second feature is a device location service. A lot of smartphones and even some tablets have a
device location feature to locate a lost or stolen device. This feature is usually a proprietary service
specific to the device manufacturer. However, there are also third-party apps that offer location services.
If the service has been set up on a device, the owner can use a website or software application to identify
the approximate location of the device on a map. The service can even do some pretty cool things, like
tell the device to take a picture with both the front and back cameras, then send the pictures to you. This
can further you identify the device's exact location.
The find my device feature does have some limitations. Because this feature uses GPS, the device needs
to have a GPS signal. If the signal can't be found, the device can't be located. The device also needs to
be powered on. This means that if the battery dies or if the person who stole it turns the device off, then it
cannot be located. And if the SIM card is taken out or the device is wiped, either from remote wipe or from
too many failed login attempts, then the device location services won't work.
Summary
So, those are some ways that you can secure a mobile device. To review, in this lesson, we looked at the
different ways you can secure the information on a mobile device. We looked at the different lock screen
authentication methods, the failed login attempt features and the two types of device encryption. And we
finished by looking at the remote wipe and device locator services.
Mobile devices are used for everything from making phone calls to managing bank accounts,
and everything in between. As such, they pose a unique security threat. A single smartphone
sometimes contains more personal information than a desktop computer. And all that
information is in a device that can be lost essentially anywhere. The following table lists
methods for securing your mobile device:
Device encryption Another line of defense that can be implemented, and is used
by default on most new devices, is encryption. Encryption
prevents someone from accessing the stored information in
any capacity. This means even if someone got a hold of a
device and were somehow able to copy the contents of the
device, they wouldn't be able to view any of the information. It
would be encrypted. There are two types of encryption
methods used by mobile devices:
Trusted vs untrusted Applications for mobile devices can be placed into two
categories: trusted and untrusted.
apps
Untrusted apps are those that have not been verified
and approved by the app service. While it's possible
that an untrusted app could be entirely safe, it's just
too risky to install one. In fact, most devices won't
allow them to be installed by default. Software for
mobile devices should be restricted to trusted app
stores such as Google Play, the Microsoft Store, or
Apple App Store.
Policies and Use policies and procedures to secure your mobile devices.
procedures
BYOD vs. corporate owned. Some organizations
implement security policies that forbid users from
connecting their personal mobile devices to the
organizational network (wired or wireless). Some
organizations allow mobile devices; in fact, they may
even provide users with mobile devices. However,
there is a risk in this situation that company data may
be copied to these devices that could be
compromised if a device is lost. As a safeguard, many
of these organizations require that remote wipe be
enabled on the device so that if it is lost or stolen, a
command can be sent remotely to the device to
remove all data on it.
In this demonstration, we're going to discuss mobile device security. Specifically, we're going to look at a
few things you can do to increase the overall security of an iPad running the iOS operating system.
Passcode Locks
Let's begin by discussing passcode locks. I'm going to go to settings and then I'm going to tap on
Passcode. Now, you can use passcodes on your iPad to protect the information stored on the device.
Now, if you set a passcode, then every time the user either powers on the device or wakes it up, the user
will be prompted to enter the passcode that you set before they can run any apps or access any of the
information on the device. And that's a really good idea in case you, for example, forget and leave this
device in a taxicab, hotel, train station or airport. We don't want folks to be able to pick up the device and
have full access to whatever's on it.
So, to do this, we need to turn passcodes on. Notice that, right now, passcodes are currently turned off.
Let's go ahead and tap Turn Passcodes On, and then we're prompted to set a new passcode. I'll go
ahead and do that. And then we're prompted to re-enter it. So, at this point, we have a passcode set.
Now, the end user will be prompted to enter that passcode whenever they try to wake it up or power it on,
basically, whenever they need to unlock the screen.
Auto Lock
In addition, we can also specify how long this device can be idle before we're going to require the
passcode to be re-entered. So, first of all, we need to go back to our general screen. And then, on the
general screen, we need to locate Auto-Lock right here. Notice that currently Auto-Lock is set to Never,
which basically means that this iPad can sit idle forever if we wanted it to. And hence, the user will not be
required to re-enter the passcode.
Let's change that. I'm going to tap on Never. And let's set the auto-lock for two minutes. Go back. Now, if
this iPad sits idle for 2 Minutes, meaning I'm not tapping anything, then the screen is automatically going
to lock.
Now, let's go back to passcode locks here. And I do need to enter the passcode that I just set to do so.
Notice that there's an option here called Require Passcode. Currently, it's set to require the passcode
after 15 minutes. Note here on the screen, it tells us that shorter times are more secure. Let's go ahead
and crank this down to one minute. This gives us a little bit of leeway if we're using the device so we're
not constantly re-entering the passcode. But if this sits for one minute, then we are going to have to re-
enter the passcode.
Okay, so to this point, we've enabled a passcode, we've set our screen to automatically lock after two
minutes and we're going to require the end user to re-enter that passcode if the device has been idle for
one minute.
Erase Data
So, at this point, we've increased the security quite a bit on this device.
However, there are other things we can do. For example, notice at the bottom of this screen, there's an
option called Erase Data. This is kind of a nuclear option. If I turn erase data on, then all of the data on
this iPad will be erased if the end user tries to enter a passcode and they do so incorrectly 10 times in a
row. After 10 consecutive failed passcode attempts, all of the data on this iPad is going to get erased.
Let's turn that option on. And it warns us, "Hey, if you turn this option on, then everything on this iPad is
going to be erased after 10 failed passcode attempts." We're going to go ahead and say, "Yep, we know.
Let's enable it."
Now, this is a powerful option, and you actually have to decide whether you want to have this option
turned on or not because if you have it turned on and you or somebody else enters the wrong passcode
10 times in a row, then you're going to have to restore all the data on this iPad from backup, either from
iTunes on a PC using a USB cable or pulling it down from iCloud.
Basically, what we're assuming is that if somebody enters the wrong passcode 10 times in a row, it isn't
their iPad. It belongs to somebody else and they're trying to break in. Therefore, we're going to wipe any
useful information off of the device in an attempt to prevent them from gaining access to it.
Complex Passcodes
So, at this point, we've really increased the overall security of this device. However, there's still a couple
more things we can do. One of those has to do with the nature of the passcode itself. Notice here that the
option for simple passcodes is currently turned on. In fact, it's on by default. That's why I only had to
configure a four-digit passcode number.
Well, honestly, a four-digit passcode number really isn't all that secure. It's just too short and the
characters you can use are really limited. Basically, you can only use numbers. That makes passcodes a
lot easier to guess.
To further increase the security of this device, we can actually turn simple passcodes off. Now, when I do
this, I have to provide my old simple passcode. And now, I'm allowed to enter in a new passcode, but this
passcode is different. It can be longer and it can include both numbers and letters. This makes passcodes
much more difficult to guess.
Let's enter in a new passcode. Tap Next, now I have to re-enter that passcode again. And now I'll tap
Done, and now I have a much more complex passcode set. And now, this new passcode will be much
more difficult to guess than the simpler four-digit passcode we were using.
Another aspect of mobile device security involves being able to track down a lost device because, frankly,
these devices do get lost. They get lost all the time. People leave them on airplanes, they get left in hotels
and taxicabs and elevators and train stations. And if this happens, you not only want to protect the data
on the device, but you also probably want to figure out where that device is.
Many mobile devices provide functionality that you can use to locate the lost device. Now, the iOS
operating system running on this iPad provides a function called Find My iPad, and it's tied to the iCloud
backup function. If we enable this function and then we lose this iPad, we can then sign in to iCloud from
any web browser on a PC or a laptop system and then use the Find My iPad option to view the
approximate location of the iPad on a map.
To do this, we need to tap on iCloud, and then scroll down a little bit. Notice down here that the Find My
iPad option is already turned on. By doing this, we have a lot of options. Not only could we view the
approximate location of the iPad on a map by going to iCloud.com, we can do a lot of other things too.
For example, we could have a message displayed on the iPad telling whoever finds it how to get ahold of
you. You could even use iCloud.com to go in and remotely change the passcode lock assigned to this
device. And if you're really concerned about not losing the data on a lost device, then you can actually
use iCloud.com to perform a remote wipe.
Now, this is a meat cleaver approach. Essentially, what we're doing with a remote wipe is assuming that
the iPad is lost and that the person who found it has no intention of returning it and they may actually
want to get at the information that's stored on it. In this case, you can use iCloud.com to send a remote
wipe command to the iPad, which will then restore the iPad to its original factory settings. Any personal
information on it, as well as any proprietary sensitive information belonging to your organization, gets
wiped out.
And if you have this option turned on, it's not a bad idea to come over here under Backup and turn on
iCloud Backup as well. I'm going to tap OK. The idea here is that if you ever do end up needing to perform
a remote wipe or if you end up just losing the iPad altogether and never getting it back, then you can
restore all the data from your old iPad onto a new iPad. Go ahead and tap Cancel for now.
Summary
That's it for this demonstration. In this demo, we talked about some things you can do to increase the
overall security of a mobile device, in this case, an iPad. We began this demonstration by talking about
how to set passcode locks, we talked about how to set the auto-lock feature of the iPad, we talked about
wiping the data off of the iPad if somebody enters the wrong passcode more than 10 times in a row, and
then we ended this demonstration by talking about how to locate a lost device using the Find My iPad
option using iCloud.
In this lesson, we're going to take a look at the various problems that are specific to mobile devices, and
the steps you can take to troubleshoot common issues.
Now, before we begin, it's important to note that there are a lot of differences between mobile devices.
This is especially true with Android devices. The exact same Android OS version can look entirely
different depending on the smartphone manufacturer.
However, even though there are differences, the troubleshooting techniques we'll talk about in this lesson
can be used regardless of the mobile OS or phone manufacturer, and when in doubt, refer to the device
manufacturer's documentation on how to fix a particular issue.
Display Issues
Let's start with the display on a mobile device. Because of their mobile nature, mobile devices are prone
to being dropped. The damage caused from dropping a device can range from a minor scratch to a
completely broken display and screen.
If a mobile device is having display issues, the first thing you should identify is whether or not the display
was dropped recently, even if there is no physical damage. This is because sometimes even a fall that
results in no external damage can still cause internal damage. If the display does have cracks or physical
damage, chances are the entire screen has failed and needs to be replaced.
Before replacing the screen entirely however, make sure the device is on and fully charged. Sometimes
the display not working is as simple as the device not being turned on. Another thing to check for is the
display's brightness.
Most mobile devices have an auto-brightness setting that changes the screen's luminance depending on
the ambient light. It's possible the auto-brightness was accidentally disabled and the screen is at the
lowest brightness setting.
Touchscreen Issues
To rule this out, look at the screen in an area with very little light.
Another issue related to the screen has to do with the touchscreen functionality. If the touchscreen is not
being responsive, or the touching accuracy is off, there are a couple of things you can look at.
First, remember that mobile devices use capacitive touchscreens. This means a conductive material,
such as a finger, needs to contact the screen for a tap to be recognized. As such, wearing gloves, or
using nonconductive utensils will cause the touchscreen to not function.
Conductive touchscreens can also be affected by even the smallest amount of liquid on the screen. A tiny
drop of water can cause the touchscreen to behave erratically or not work at all, so make sure the screen
is clear of any moisture.
A cracked or damaged screen can also cause touchscreen problems. If this is the case, the screen should
most likely be replaced. This is especially true if the screen is made of glass, as not only will the
touchscreen not work, but it's very easy for the cracked edges to cut a finger.
If there is no physical damage, but the screen seems to respond inaccurately, it's possible that the screen
needs to be calibrated. To do this, enter the configuration settings of the device and follow the calibration
steps, which usually involves tapping specified areas on the screen multiple times.
Battery Issues
Another area of concern for mobile devices is the battery. Not only can the battery cause several
problems, but it can also be used to identify other non-battery related issues.
For example, let's say a mobile device's battery is being drained a lot faster than normal. One initial
reaction is to replace the battery with a new one, but what if the problem wasn't actually the battery, but it
was instead due to the fact than an installed app on the device was always running and consuming
resources? In this situation, a new battery wouldn't fix this issue. Because of this it's important to be able
to identify whether a battery is faulty or not.
A swollen battery is probably the easiest way to identify a bad battery. If the battery is bulging at all, it
needs to be replaced immediately. If not replaced, the battery could explode and even cause a fire.
If there are no physical abnormalities, try to identify how old the battery is. Most smartphone batteries only
have a lifespan of about a year. After that, the amount of charge they can hold is drastically reduced.
If the battery is new and has no physical abnormalities, the battery drain could be a result of too many
running apps. Many mobile devices actually have a battery usage history that can be used to identify
which apps are consuming the most battery power. You can then uninstall or disable the culprit if
necessary.
Performance Issues
Performance issues are another problem that can occur with mobile devices. If the device seems to be
running slow, there are a couple of things you should look for.
First, identify the system resources and usage. Check how much memory running applications are
consuming, and disable any unnecessary apps. One indication of high resource usage is the mobile
device being warm or hot to the touch, which indicates the device is doing a lot of processing.
Second, check to see if the device is attempting to run applications that are intended for newer devices.
Even though an app can be installed on an older device, it doesn't mean the device will be able to run it
properly. Just like desktop computer applications, mobile device apps have recommended hardware
specifications.
Third, check the device's storage usage. If the mobile device storage is more than 80% full, performance
can be reduced considerably. If this is the case, uninstalling unnecessary and unused apps can help
speed up performance.
Connection Issues
Connection issues are another area where mobile devices can have problems. Not only do most mobile
devices connect to a cellular carrier server, but they also use Wi-Fi, Bluetooth, and GPS technology for
communication.
When troubleshooting connection issues, make sure the device is not in airplane mode. In this mode,
cellular service is disabled, and other wireless connections are also typically disabled.
Make sure that the wireless technology in question is properly enabled. GPS, Wi-Fi, and Bluetooth can all
be turned off on mobile devices to conserve battery power, or to protect the device from unwanted
connections.
Make sure that the device has a solid connection to the service in question. For cellular connection
problems, check the level of connection, 1X, 3G, 4G, etcetera, and the number of bars which indicates
the signal strength.
For Wi-Fi, make sure the device is connected to the access point and has a solid connection. If the single
seems to be intermittent, try installing and using a Wi-Fi analyzer app to identify the signal strength and
interfering signals.
For GPS to function properly, the device needs a line of sight connection to satellites in orbit. If there are
obstructions such as a large building, the connection won't work properly,
and most Bluetooth devices need to be paired with each other by entering discovery mode and using a
special code. If pairing hasn't been configured, devices won't be able to communicate with each other.
Frozen Device
Occasionally you may run into a problem that requires the device to be restarted, such as a frozen app, or
the device itself is locked up. If this is the case, there are two ways to reboot a mobile device. The first,
and preferred method, is to do a soft reset.
With a soft reset, you hold the power button on the device, and depending on the device, the device will
reset, or the power options dialog will appear, giving you the option to shut down or restart the device.
The second method is a hard reset, which should only be used if a soft reset doesn't work. With a hard
reset, the device's battery is typically removed and then reinserted. If the device's battery can't be
removed, a hard reset is performed by holding a combination of buttons on the device until it powers off.
Summary
Those are just some of the issues you may encounter when working with mobile devices. Remember,
mobile devices vary by both manufacturer and operating system, so the configuration and troubleshooting
steps for one device might be completely different for another.
However, by understanding the basics we've talked about in this lesson, you should be able to
troubleshoot any mobile device you encounter.
Mobile devices present a unique challenge for troubleshooting. Because of their mobile nature,
they are prone to a variety of problems that can manifest in various ways. The following tools
can be used to help troubleshoot mobile devices:
Tool Description
App An app scanner is a tool that can be used to identify problems with
scanner installed apps.
When installed, the app scans all installed apps on the mobile
device and uses a definitions list to identify any issues.
Wi-Fi analyzers are special apps that can be used to troubleshoot Wi-Fi
connectivity issues. Most Wi-Fi analyzer apps provide the following
functionality:
Signal strength/interference
The following table describes some of the most common mobile issues and the steps you can
take to identify and fix the problem:
Issue Description
No display A mobile device's display can stop working for a several reasons. If
you are troubleshooting a mobile device with a display issue, consider
the following:
Unauthorize Mobile devices are vulnerable to many of the same attacks that target
d access desktop systems. One such attack is unauthorized access, where an
attacker gains access to a specific feature or functionality of the
mobile device.
Weak or no Most connectivity issues are a result of a weak signal or some sort of
signal interference. If a mobile device is having connectivity problems, try
the following:
If the device seems to be running slow, there are a couple things you
can look at in order to identify the problem:
Slow/poor
Make sure the app being used is compatible with the mobile
performance
device. Older mobile devices have slower processors and
might not be able to run all the latest mobile apps available
to it.