You are on page 1of 40

Portable Power

Desktop systems don't have to worry too much about power use, they essentially have an endless supply
of energy through the wall outlet. And while a component that consumes less power is beneficial for your
energy bill, it's not really a necessity with desktop systems. However, the same can't be said about
notebooks.

Notebooks are designed to be portable and run on battery power for extended periods of time. If the
notebook used energy the same way a desktop did, it would either need a huge battery or only run for
about five minutes unplugged. Neither of these options would work, instead, notebooks use two
techniques to prolong battery life.

First, they use specially designed, low-power mobile components, such as mobile processors, mobile
GPUs, and low-power hard drives, these components consume much less power than their desktop
counterparts.

Advanced Power Management

The first type of power management tool used by computers was called Advanced Power Management,
or APM.

APM is a legacy power management tool that's rarely used anymore, in fact, only certain versions of
Linux even support it. With APM, instead of the operating system controlling hardware, the BIOS was
responsible for controlling hardware. This meant that the BIOS could do things like turn off a hard drive
without the operating system even knowing. This also prevented the operating system from receiving real-
time statistics about hardware components. APM had several other inherent flaws, as such, modern
systems now use the ACPI standard.

Advanced Configuration and Power Interface

The second technique is actually an operating system feature that's used by both desktop and notebook
systems called Advanced Configuration and Power Interface, or ACPI.

ACPI is used by operating systems to communicate directly with hardware components and allows the
OS to discover, configure, monitor and manage the power of hardware components.

With ACPI, hardware configuration settings are controlled entirely by its operating system. This is known
as Operating System-Directed Configuration and Power Management, or OSPM. How ACPI works is the
operating system receives real-time statistics about how much power each hardware component is using.
The operating system then uses this information to decide whether it should leave it alone, reduce the
amount of power it's consuming, or shut it down entirely.

For example, let's say the operating system notices that its secondary hard drive hasn't been accessed in
over an hour, the operating system decides that the hard drive probably doesn't need to be on, so it
powers it off, now let's say another hour passes and the computer needs to access a file on that hard
drive. The operating system then powers the hard drive back on so the file can be accessed. This does
cause a bit of a delay in accessing the file, but the operating system was able to save energy by not
powering the drive for an hour.

Another example might be with a CPU. Let's say the operating system notices that only 30% of the CPU's
potential is being used. To save energy, the operating system decides to reduce the voltage to the CPU.
Since the CPU isn't being used heavily, this performance reduction isn't even felt by the user. If the CPU
suddenly needs to do more processing, the operating system can simply increase the voltage to the CPU
and increase its performance capability.

Now these are examples with individual components, but ACPI is also able to make system-wide power
management changes, and it does this based on the ACPI power state.

ACPI Power States

The first ACPI power state is On. When in this state, all power management functions are off, all devices
are running at full power and no power management is taking place.

The second power state is Enabled. In the Enabled state, power management is turned on but no devices
are shut down.

The third power state is Standby, during Standby, the CPU is shut down, however, RAM retains its
contents. In addition, all peripheral devices are also shut down.

The fourth power state is Suspend, with Suspend, everything in the computer is shut down except for
RAM. Because the RAM still has power, the contents are retained, however, everything else gets shut off.

The fifth power state is Hibernate. When a computer is in this state, everything is shut off in the computer,
even the RAM, however before the RAM and CPU lose power, their contents are transferred to the hard
disk drive, and then this system is shut down. When the system is powered back on, the information
saved from the CPU and RAM are loaded back into the hardware components and the system resumes
exactly where it left off. When used with notebooks, ACPI can extend the battery life by a considerable
amount, if certain components haven't been used in a while, they can be shut off or suspended until they
are needed again. ACPI can also control the power use of plug and play devices such as portable hard
drives. Notebooks can also take advantage of the different power states offered by ACPI, for example, if
you need to travel from one location to another, you can quickly Hibernate the notebook, move locations,
and then pick up exactly where you left off.

Summary

It's also possible to configure ACPI to automatically enter certain power states after a specified period of
inactivity.

Notebook systems are designed to use as little power as possible. Common ways notebook
systems save power are:

Turning off any drives that aren't currently being used


Stepping down the bus speed in the CPU

Turning off the monitor after a period of inactivity

Putting the computer to sleep or turning it off automatically

When your laptop is plugged into the wall, it is receiving power through an adapter that
converts the AC power from the outlet to DC power usable by the computer. Most adapters can
be used on both 110 and 220 AC volt power sources. The energy received through the adapter
is divided between running the notebook system and charging the battery.

Remember that most adapters are not interchangeable between laptops because laptops
require varying amounts of voltage and amperage and also have different plugs. Before
connecting a laptop to an adapter, look at the information listed on the adapter to make sure
that it supplies the correct amount of voltage and amperage necessary for your specific laptop
and has a plug that will fit properly. Failing to use the correct adapter can cause a laptop to:

Receive insufficient power to turn on

Receive insufficient power to charge the battery

Receive an excess of power that will fry the system

When a laptop is not plugged into the wall, it receives its power from the battery. Batteries wear
out over time so you should expect to replace your battery every few years. It is best to never
let a battery run extremely low because the life of a battery significantly decreases if it loses all
of its charge. The following table lists the battery types that might be used in portable devices:

Battery Characteristics

Develops a memory and begins to store less power as it is


repeatedly recharged. To avoid battery memory problems,
completely drain the battery before recharging it
Nickel
Cadmium Takes up more physical space than Lithium Ion batteries
(NiCad)
Very heat sensitive

No longer used on new laptops

Nickel Metal
Hydride Does not develop a memory
40% longer lifetime than Nickel Cadmium

(NiMH) Greater charge capacity than Nickel Cadmium

Less toxic than Nickel Cadmium

Slightly more expensive than Nickel Cadmium

Does not develop a memory

A rechargeable battery with twice the capacity of a nickel-


cadmium battery with significantly increased stability and
safety

Takes up less physical space and weighs less than Nickel


Cadmium or Nickel Metal Hydride batteries for comparable
Lithium Ion (Li- power output
Ion)
Has a shorter lifespan than Nickel Metal Hydride

Not heat sensitive like Nickel Cadmium

Cannot be overcharged

More expensive than Nickel Cadmium or Nickel Metal


Hydride

A growing technology that is still developing and is recently


being implemented into the small electronic device market

Not truly a battery


Fuel Cell
Offers instant power and uses replaceable cartridges

Rather than being recharged (taking hours), when its charge


becomes low, the fuel is merely replaced (taking seconds)
Batteries contain dangerous and regulated chemicals. Always dispose of batteries according to
the manufacturer's directions. Disposing of batteries improperly might also be illegal.
The ability for a computer to manage devices to conserve power is made possible by
implementing the Advanced Configuration and Power Interface (ACPI) standards.

ACPI is also known as Instant Available and Always On. Is often mistakenly referred to as
APM (an older standard).

The operating system, BIOS, and devices interact to manage power.

Users can configure settings that identify events and power consumption
characteristics. For example, you can configure the display to turn off after 5 minutes
of inactivity.

The system can monitor the battery and other device states and dynamically change
power consumption on one or more devices.

ACPI supports Plug and Play.

ACPI standardizes a number of power states as are listed in the table below:

Power State Characteristics

On No power management being used

Power on
Enabled
Nothing is shut down

CPU is off

RAM retains contents


Standby
Peripherals are all off

Restores the computer more quickly than from hibernation

Suspend
RAM retains contents
All other components are off

Restores the computer more quickly than from hibernation

All components are off

Hibernate Data in memory is saved to a file on the hard disk

Restores desktop exactly as it was

Windows uses Power Schemes to manage power for the system. A power scheme is a collection
of power settings that are either predefined or created by a user for use in different computing
environments.

Each power scheme controls power down settings for the monitor, hard drives, and the
entire system, and has settings for when running on AC power or on battery power.

You can modify the existing schemes or create new ones to meet your needs through
the Power Options utility in the Control Panel. In Windows 10, you can edit power
schemes by right-clicking on the desktop, selecting Display Settings > Power & Sleep.

The preconfigured power schemes available depend on the operating system version
and the computer type (laptop or desktop). Some manufacturers also include
preconfigured power schemes. Default power schemes are often included to maximize
performance or power savings.

Power schemes work for both laptop and desktop systems.

Edit the power scheme to control what the device does when you press the power
button, shut down the system, or close the laptop lid.

In Windows, sleep corresponds to the suspend ACPI state. With hybrid sleep, data in
memory is retained as well as written to the hard disk. If the computer is turned off
while in hybrid sleep, it can be resumed using the data stored on disk.

Be aware of the following when working with power settings:

Power management must be supported by the BIOS, devices, and the operating system.
In Windows, hibernation must be enabled before you can select Hibernate as an option
for shutting down the system or in a power scheme.

The BIOS must have ACPI support enabled before you can enable hibernation in
Windows. If the Hibernate tab is missing, check the BIOS. If the BIOS does not have a
setting for ACPI, you might need to upgrade the BIOS.

By default, Windows is allowed to control power to all devices that support the feature.
You can edit the device properties in Device Manager to prevent Windows from
controlling the device.

The Wake on LAN (WoL) feature allows a device that receives a special network signal to
wake the computer from a sleeping or hibernated state. WoL is often used by desktop
administrators to remotely start up computers for management purposes.

o By default, devices are not allowed to wake the computer, although they might
support this feature.

o Edit the device properties in Device Manager to allow a device to wake the
computer.

o WoL is not recommended for laptop computers, as the computer will


periodically come out of standby to check its network state which runs down
the battery.

Mobile Device Overview

In today's world, mobile devices are becoming more of a necessity than a luxury. This is
especially true with smartphones, which are the most widely used mobile device.
In this lesson, we're going to spend some time looking at the different types of mobile devices you
need to be familiar with. We'll also take a look at the common characteristics that all mobile
devices share.
Let's start by looking at the different types of mobile devices you are most likely going to
encounter.
Smartphone

Probably the most common mobile device is the smartphone. Smartphones combine the
functionality of a cellular phone with the features of a desktop computer. When they were first
developed, they really were kind of limited in their functionality. However, smartphones have since
become some of the most powerful and versatile mobile devices.
Smartphones are able to access the internet either through a WI-FI connection or by using a 3 or
4G cellular connection. They can also be used as a GPS navigation unit, a portable gaming
device, and a mobile music player. Smartphones typically have a screen size between 2.5 inches
and 5 inches.
Tablet

The next type of mobile device is a tablet. Tablets were some of the first types of handheld mobile
devices. They typically have more computing power than smartphones, but are also a lot larger
and more expensive. A typical tablet screen size is between 10 inches and 15 inches.
Tablets are designed as a type of notebook replacement. While they aren't as powerful as a
notebook system, they tend to be more portable, have a longer-lasting battery, and have much of
the same productivity tools available to them. Most tablets can even connect to a wireless
keyboard to allow for easier typing.
Phablet

There's another mobile device that's sort of a hybrid between a smartphone and a tablet. This
device is called a phablet. Phablets aren't as small as a smartphone, but aren't as powerful as a
tablet. They're somewhere in between. Phablets usually have a screen size between 5.2 inches
and 7 inches. In fact, any smartphone with a screen bigger than 5.2 inches is technically a
phablet, not a smartphone.
Most phablets are able to use special stylus pens to interact with the device. This allows for more
accurate screen tapping for things like writing notes, drawing diagrams or navigating apps.
The next mobile devices we'll look at are actually a family of mobile devices that are meant to be
worn on the body. As such, these are called wearable technology devices, or simply wearables.
Wearable Devices

Wearables are a type of mobile device that is meant to be worn somewhere on the body. These
devices range from being as simple as a step-tracking wristband to as complex as a virtual reality
headset. Most wearable devices are designed to interface with another device.
For example, a smartwatch by itself has a limited set of functionality. However, smartwatches are
designed to connect to smartphones using Bluetooth. Doing this unlocks additional functionality,
such as reading texts or answering phone calls through the smartwatch.
E-reader

There's one more mobile device we need to look at called an e-reader.


E-readers are similar in size to tablets, but they lack the functionality of a tablet. Their primary
purpose is for reading digital books, newspapers, magazines, and other periodicals. Most e-
readers use e ink to display digital content.
E ink is a special technology that creates a high-contrast black-and-white display. Even though
they can only display grayscale, e ink screens are great for e-readers because they consume
much less power than LCD screens and they don't suffer from visibility problems when used in
bright sunlight.
Mobile Device Power

Now, whether it's a tablet, smartphone or an e-reader, all mobile devices share some common
characteristics, the most common of which is its power source.
Now, as their name implies, mobile devices need to be mobile. This means they need to have
some sort of mobile power source. This source is typically a lithium ion battery. Lithium ion
batteries are rated in milliamp hours. The larger the number, the greater the battery capacity. For
example, the average smartphone battery is about 2,000 milliamp hours, whereas a notebook
battery is about 6,000 milliamp hours.
Mobile Storage

Another characteristic of a mobile device is its storage.


In order to extend the battery life, mobile devices use some sort of non-volatile flash memory to
store information. This type of memory consumes a lot less power than the magnetic drives, such
as those found in desktop and notebook systems. Because no moving parts need to be powered,
flash memory is a much more energy efficient storage
medium. In addition, a lot of mobile devices have expandable storage in the form of microSD
cards. This allows mobile devices to increase their storage to upwards of 200 gigabytes.
Wireless Features

Mobile devices also need to be able to have mobile connectivity to the internet and other types of
mobile devices. To do this, mobile devices use a variety of wireless connection mediums. For
example, the typical smartphone uses 802.11 Bluetooth and cellular wireless technologies. Some
mobile devices might only use 802.11 wireless or only Bluetooth, but a lot of mobile devices use
multiple wireless mediums.
Internal Sensors

Mobile devices also have some sort of internal sensor that collects environmental data. A
common example of this is a GPS chip. Mobile devices use GPS chips in order to calculate the
device's location information. This is helpful for things like navigation applications and device
location services.
Another internal sensor that mobile devices use is called an accelerometer. An accelerometer is a
sensor that detects movement on a single plane. In mobile devices, this is typically the horizontal
plane. This is actually the device that detects when a mobile device is turned sideways and tells
the device to change the screen's orientation.
A third sensor used by mobile devices is called a gyroscope. A gyroscope also detects
movement, but it does so a bit differently than an accelerometer. Instead of detecting movement
on a single plane, a gyroscope detects horizontal and vertical movements. If you've ever played a
game on a smartphone or tablet that requires you to tilt the device, then you've used a gyroscope.
Touchscreen

The most common characteristic of a mobile device is its touchscreen. Because mobile devices
are designed to be extremely mobile, they typically don't use peripheral devices in order to use
the device. Instead, mobile devices use capacitive touchscreens to receive user inputs.
The reason mobile devices use capacitive touchscreens as opposed to resistive touchscreens is
because they are able to detect multiple contact points. For example, being able to zoom in on a
photo using two fingers is only possible because of the capacitive touchscreen. The one
drawback is the fact that capacitive touchscreens require a conductive object to touch the screen,
so a gloved hand won't be able to manipulate the screen.
Some mobile devices are also capable of using a special stylus to interact with the device. The
stylus looks very similar to a pencil or pen, but has a special tip that allows you to draw, write or
interact with the device much more accurately than is possible with a finger.
Mobile Operating Systems

Another characteristic of mobile devices is their operating system. Unlike notebooks, which use a
desktop operating system that contains mobile features, mobile operating systems are designed
specifically for mobile devices and with a touchscreen interface in mind. The three most common
mobile operating systems are Android, iOS, and Windows Phone. While there are actually several
more than these three, you really only need to be familiar with these ones here.
Now, often times, the decision between purchasing one mobile device over another is largely
based on the operating system they use, and the primary reason for this is due to the fact that
each operating system uses its own proprietary app ecosystem, which is another characteristic of
mobile devices.
App Ecosystem

Software programs that run on mobile devices are called apps. And mobile devices can only use
apps that have been written specifically for a particular mobile operating system. This means an
app written for an android won't be able to run on iOS and vice versa.
Because of this, each mobile OS has its own app ecosystem, which is a fancy way of saying the
number of apps that a particular mobile OS has available to it. For example, iOS uses the iOS
App Store, Android uses the Google Play Store, and Windows Phone uses the Windows Phone
Store.
Just like most things, each app ecosystem has pros and cons which are largely opinion-based.
The main thing to know is that when you purchase a particular mobile device, you are buying into
a specific app ecosystem.
One final thing you should be aware of regarding mobile devices is the fact that most of the
internal hardware components are non-serviceable. This means if, for example, the processor
fails, you have to purchase an entirely new device. It's sometimes not even possible to replace a
faulty battery in some mobile devices.
This actually touches on the fact that mobile devices are not designed as a complete solution.
They are instead designed to be a supplement to other computing devices. And while they do
have a lot of functionality and do a lot of things really well, they do have their limitations.
Summary

Okay, so that's it for this lesson. In this lesson, we looked at different types of mobile devices that
you should be familiar with. We also looked at the common characteristics that all mobile devices
share, such as power, storage, wireless connections, and touchscreens. And remember, mobile
devices use mobile operating systems that each use their own proprietary app ecosystem.
The following table lists the most common mobile devices you will encounter:

Device Description

Tablet devices use a touchscreen interface instead of the touchpad and


keyboard used by notebook PCs. The touchscreen interface is usually
capacitive, meaning that it requires conductive material, such as your
Tablets
finger tip, for input. Capacitive touchscreens provide multi-touch
capabilities, which allow the tablet to recognize multiple finger touches
at the same time.

Smartphones combine the functionality of a cellular phone with the


features of a desktop computer. Smartphones can access the Internet
Smartphon either through a Wi-Fi connection or by using a 3G, 4G, and LTE cellular
es connection. They can also be used as a GPS navigation unit, a portable
gaming device, and a mobile music player. Smartphones typically have
a screen size between 2.5 inches and 5 inches.

Wearable Wearable devices are a type of mobile device meant to be worn


devices somewhere on the body. These devices range from being as simple as
a fitness tracker wrist band to as complex as glasses or a virtual reality
headset. Most wearable devices are designed to interface with another
device. For example, a smartwatch by itself has a limited set of
functionality; however, smartwatches are designed to connect to
smartphones using Bluetooth. Doing this unlocks additional
functionality, such as reading texts or answering phones calls through
the smartwatch.

Phablets are a hybrid between a smartphone and a tablet. They aren't


as small as a smartphone and aren't as powerful as a tablet. They are
somewhere in between. Phablets usually have a screen size between
5.2 and 7 inches. In fact, any smartphone with a screen bigger than 5.2
Phablets
inches is technically a phablet, not a smartphone. Most phablets are
able to use special stylus pens to interact with the device. This allows
for more accurate screen tapping for things like writing notes, drawing
diagrams, or navigating apps.

E-readers are similar in size to tablets, but they lack the functionality of
a tablet. Their primary purpose is for reading digital books,
newspapers, magazines, and other periodicals. Most e-readers use E
ink to display digital content. E ink is a special technology that creates a
E-readers
high-contrast, black and white display. Even though they can only
display grayscale, E ink screens are great for e-readers because they
consume much less power than LCD screens and they don't suffer
from visibility problems when used in bright sunlight.

Some of the key features of mobile devices are shown in the following table:

Feature Description

An accelerometer is also called a g-sensor. It detects the physical


movements of the tablet by measuring its linear acceleration in one
Accelerometer dimension. The user interface can be automatically rotated to
portrait or landscape mode, depending on the orientation of the
unit.

Applications must be written to run on mobile devices based on the


operating system and system architecture. App distribution is
provided online by platform:

Apps Google: Play Store

iOS: AppStore

MS: Windows Store


Two computer architectures are used by mobile devices:

x86: The x86 architecture is compatible with standard x86 PC


hardware and software, which allows the device to run
operating systems such as Windows. Some newer versions
of Android can also run on the x86 architecture.
Architecture

ARM: Some tablets, such as the iPad, use the ARM


architecture. ARM is more power-efficient and less
expensive to manufacture than x86. Android runs primarily
on ARM.

An emergency notification system is a method of facilitating the one-


Emergency
way broadcast of messages to one or many groups of people,
notification
alerting them to a pending or existing emergency.

Geotracking is the ability to identify a person's current, physical


Geotracking location by obtaining GPS data from their smartphones or other
GPS-enabled devices.

GPS is a space-based navigation system that provides location and


time information in all weather conditions, anywhere on or near the
Global
Earth where there is an unobstructed line of sight to four or more
Positioning
GPS satellites. Mobile devices use GPS chips in order to calculate the
System (GPS)
device's location information. This is helpful for things like
navigation applications and device location services.

A gyroscope measures the vertical and horizontal orientation of the


device. This essentially creates a user input mechanism. The tablet
can detect changes in vertical and horizontal acceleration and
Gyroscope
respond programmatically. For example, changes in vertical and
horizontal acceleration detected by the gyroscope can be used as
input for a gaming app.

IMEI vs. IMSI IMEI stands for International Mobile Equipment Identity and is a
unique number given to every single mobile phone, typically found
behind the battery. IMEI numbers of cellular phones connected to a
GSM network are stored in the Equipment Identity Register
database containing all valid mobile phone equipment. When a
phone is reported stolen or is not type approved, the number is
marked invalid.
IMSI stands for International Mobile Subscriber Identity. This is a
unique identifier that defines a subscriber in the wireless world,
including the country and mobile network to which the subscriber
belongs. The IMSI is one of the pieces of information stored on a
SIM card.

Internal storage is a hardware component located inside the device


Internal and used for storing data. Some tablets use solid state drives (SSD),
storage others may use on-board flash memory (such as the iPad). Some
also have external USB ports for removable storage.

Launcher is the name given to the part of the GUI that lets users
customize the home screen (e.g. the phone's desktop), launch
Launcher
mobile apps, make phone calls, and perform other tasks on Android
devices.

Mobile payment services operated under financial regulation and


Mobile
are performed using a mobile device. Instead of paying with cash,
payment
check, or credit cards, a consumer can use a mobile phone to pay
service
for a wide range of services and digital or hard goods.

Mobile devices implement 802.11b/g/n networking to provide


Networking
networking connectivity. Bluetooth is also commonly implemented
capabilities
for connecting peripherals in place of wired USB connections.

Operating Three operating systems are commonly used with mobile devices:
system
Android (open source)

o The stock version of Android contains a home


screen where you can put app shortcuts and
widgets.

o The app drawer can be found using a button on


the home screen.

o Customization possibilities are endless, Android


can even be made to look like Windows or iOS.

o All the high-end Android phones are as responsive


as other OSes.

o If it is a device with specifications from Google,


which is the case with the Nexus series and the
Android One series, then it is completely lag free
and fairly responsive.

o Android has the most number of applications in its


Google Play Store.

o Many Android manufacturers like Samsung, Sony,


HTC, LG, and Motorola.

iOS (closed source/vendor specific)

o iOS is very similar in looks to Android.

o It has a home screen and a button to enter the App


Drawer.

o iOS is light weight and has lag performance free.


Since iOS software and hardware are built by Apple
alone, it is well balanced.

o iOS devices or iPhones are solely designed and


developed by Apple.

Windows (closed source/vendor specific)

o Apps on the home screen are tiles. Swiping the tile


to the left gives a list of apps installed on the
device.

o Customization options are limited to changing


colors and resizing the tiles.

o Windows Phone is light weight with a lag free OS.

o The Windows store has the least number of


applications when compared to the other two
major OSes.

o Microsoft Mobiles formerly Nokia are the leading


Windows Phone providers.

The Primary Rate Interface (PRI) is a telecommunications interface


standard used on an Integrated Services Digital Network (ISDN) for
carrying multiple DS0 voice and data transmissions between the
network and a user. The PRI is a level of service assigned by the
PRI updates ISDN, sometimes referred to as an ISDN PRI. The PRI provides
businesses with digital access to the PSTN. While ISDN PRI is usually
associated with only voice transmission, it is capable of transmitting
data, video, and faxes as well.
To upgrade PRI, you need to purchase an additional PRI line.

The Preferred Roaming List (PRL) is a database residing in a wireless


device that contains information used during the system selection
and acquisition process. Without a PRL, the device may not be able
to roam. In some cases, having a missing or corrupt PRL can lead to
a customer not having service at all. On many networks, regularly
updating the PRL is advised if the subscriber uses the device outside
the home area frequently, particularly if they do so in multiple
PRL updates
different areas. This allows the phone to choose the best roaming
carriers, particularly "roaming partners" with whom the home
carrier has a cost-saving roaming agreement, rather than using non-
affiliated carriers. PRL files can also be used to identify home
networks along with roaming partners, thus making the PRL an
actual list that determines the total coverage of the subscriber, both
home and roaming coverage.

Radio firmware controls basic low-level functions like network


connectivity, Wi-Fi, and GPS. For several years, "radio" means
Radio "baseband", and controls network connectivity aspects only, while
firmware Wi-Fi and GPS are governed by OS drivers, like any other devices.
Baseband updates may improve or diminish battery performance,
network signal strength, and roaming capability.

SDK/APK A software development kit (SDK) is a set of software development


tools that allows the creation of applications for a certain software
package, software framework, hardware platform, computer
system, video game console, operating system, or similar
development platform. To create applications, you have to
download a specific software development kit. For example, the
development of an Android app requires an SDK with Java, for iOS
apps an iOS SDK with Swift, and for MS Windows the .NET
Framework SDK with .NET. There are also SDKs that are installed in
apps to provide analytics and data about activity. Prominent
examples include Google and Facebook.

Android application package (APK) is the package file format used by


the Android operating system for distribution and installation of
mobile apps and middleware.

A smart camera is a self-contained, standalone vision system with


built-in image sensor in the housing of an industrial video camera. It
Smart camera contains all necessary communication interfaces, e.g. Ethernet, as
well as industry-proof 24V I/O lines for connection to a PLC,
actuators, relays or pneumatic valves.

A touchscreen is an input device normally layered on the top of an


electronic visual display of an information processing system. A user
can give input or control the information processing system through
Touchscreen
simple or multi-touch gestures by touching the screen with a special
interface
stylus and/or one or more fingers. The touchscreen enables the user
to interact directly with what is displayed, rather than using a
mouse, touchpad, or any other intermediate device like a stylus.

A Virtual Assistant is a program that understands your conversation,


replies to you, and carries out many daily tasks for you like sending
Virtual
mail, making a search, opening apps, reporting the news and
assistant
weather, and more. You can initiate these tasks using your voice.
Some examples of a virtual assistant include AIVIC, Skyvi, and iris.

Wi-Fi calling allows your iPhone to place and receive phone calls and
text messages over a Wi-Fi network. If you have a weak cellular
Wi-Fi calling signal but a solid Wi-Fi signal, your iPhone will automatically switch
over and route calls and texts using Wi-Fi. You can only use this if
your cellular carrier supports it.

Mobile phone accessories include any hardware or software that is not integral to the operation
of a mobile phone as designed by the manufacturer. Some mobile accessories are described in
the following table:
Accessory Description

Mobile headsets allow you to listen to music and answer phone


Headsets calls. Mobile headsets come in both corded and cordless varieties
using Bluetooth technology.

Speakers allowing you to listen to your mobile device without


Speakers headphones. Portable speakers can be connected to your mobile
device using Bluetooth or through the earphone jack.

Gamepads allow you to turn your mobile device into a virtual


Game pads
multi-touch gamepad for PC games through a Wi-Fi connection.

A docking station allows you to charge an electronic device.


Because a wide range of dockable devices have different
Docking stations connectors, power signaling, and uses, docks are not standardized
and are designed for a specific make and model of a mobile
device.

Cell phone chargers have gone through a diverse evolution that


included cradles, plug-in cords and obscure connectors. However,
Extra more recent devices generally use micro-USB. (Apple devices still
batteries/charge use proprietary cables.)
rs
External batteries can be included in the case (power case). Also
external batteries can include rubber suction.

Protective Protective covers or cases are designed to attach to, support, and
covers hold a mobile device. Protective covers are meant to protect a
mobile device from accidental drops, shock, and water.
Protective covers include:

Pouches and sleeves

Holsters

Shells

Skins
Bumpers

Flip cases and wallets

Screen protection and body films

Leather Case

Credit card A credit card reader allows you to accept credit and debit cards
readers payments through your smartphone or tablet.

Some smartphones feature SD card slots, usually the smaller


Memory/MicroS MicroSD variant. These, in combination with a compatible SD card,
D can be used to transfer files from one device to another, or simply
to increase the storage capacity of the phone.

The following table lists different mobile connection types:

Connection
Description
Types

A hotspot is a physical location where you can obtain wireless


Hotspot Internet access using a wireless local area network (WLAN) with a
router connected to an Internet service provider.

Tethering is connecting one device to another. In the context of


mobile phones and tablet computers, tethering allows sharing
the Internet connection of the phone or tablet with other devices
Tethering
like laptops. Connection of the phone or tablet with other devices
can be done over wireless LAN (Wi-Fi), over Bluetooth, or by
physical connection using a cable like USB.

Airplane mode is a setting available on many smartphones,


portable computers, and other electronic devices that suspends
Airplane mode
the device's radio-frequency signal transmitting functions, which
disables telephone, Wi-Fi, and Bluetooth when activated.

VPN A mobile virtual private network (mobile VPN) provides mobile


devices with access to network resources and software
applications on their home network when they connect using
other wireless or wired networks.

Bluetooth is a wireless technology standard for exchanging data


over short distances from fixed and mobile devices and for
Bluetooth
building personal area networks (PANs). It can connect several
devices, overcoming problems of synchronization.

An NFC connector is used to emulate cryptographic smart card


NFC
functionalities for RFID tags or memory cards.

A mini-USB connector is a small USB cable connector that is often


used by handheld electronic devices like mobile phones, MP3
miniUSB/microUS players, and digital cameras. On mobile phones it is often used
B for both USB data connectivity and charging. The new connector,
called micro-USB, is smaller than the mini-USB connector and
allows for even thinner device designs.

Lightning is a proprietary computer bus and power connector


created by Apple Inc. to replace its previous proprietary 30-pin
Lightning dock connector. It is used to connect Apple mobile devices like
iPhones, iPads and iPods to host computers, external monitors,
cameras, USB battery chargers and other peripherals.

An infrared port is a port on a mobile device that enables devices


IR
to exchange data without using cables.

You can synchronize data between a PC system and a mobile device. You can also synchronize
data between your PC or mobile device and the cloud. Use a USB cable or wireless connection
to connect to a desktop or cloud to synchronize your data. You can also configure both a PC
and a mobile device to use the same iCloud account.

Online services use mutual authentication or single sign on to allow you to connect to their
servers to sync data. Mutual authentication, also called two-way authentication, is a process or
technology where both entities in a communications link authenticate each other. In a network
environment, the client authenticates the server and vice-versa. For example, iTunes requires
you to authenticate using your Apple ID to its servers, while at the same time, Apple verifies
that the iTunes app on your computer or device is the same app and computer used to access
your iTunes account. Mutual authentication is used for multiple services like purchasing music
and ebooks and saving content to the cloud.
Also, be aware of any software requirements needed to install the application on your PC or
mobile device. Some software require a specific operating system and cannot run on any other
operating system. For example, Android apps run only on Android devices. Apple apps run only
on devices with iOS.

Types of data you can synchronize:

Contacts

Programs

Email

Pictures

Music

Videos

Calendar

Bookmarks

Documents

Location data

Social media data

eBooks

You can configure email accounts on your mobile device using email service providers. Well-
known email providers include:

Exchange

Google/Inbox

iCloud

Outlook.com

Yahoo
You can also add your email account and setup the IP addresses of your POP3, IMAP, or SMTP
servers. To configure these email accounts, you may need to modify the port settings. To
encrypt your email, configure the SSL and S/MIME settings. Both SSL and S/MIME securely sign
and encrypt email. It is used to prove that the email came from the person says it is from.

Mobile Device Security

Mobile devices are used for everything from making phone calls to managing bank accounts and
everything in between. As such, they pose a unique security threat. A single smartphone sometimes
contains more personal information than a desktop computer. And all that information is in a device that
can be lost essentially anywhere.

In this lesson, we're going to take a look at the various aspects of a mobile device security and the
different ways mobile devices can be protected.

Lock Screen Authentication

Let's start by looking at the different authentication methods that mobile devices use. By default, most
mobile devices are configured to use a swipe lock screen. This means that anyone can unlock the device
with a simple swipe of the screen. There's no authentication at all. For obvious reasons, this isn't very
secure.

To secure access to a mobile device such as a tablet or a smartphone, it's important that you configure
the device's lock screen to use some sort of authentication. And there are actually several different types
of lock screen authentication methods, each with varying degrees of security strength.

Biometric

Let's take a look at a few of them.

Some mobile devices support biometric authentication on lock screens. The two most common ones are
fingerprint and facial recognition. With fingerprint recognition, the index finger of the user is scanned and
used to unlock the device.

With facial recognition, the device's camera is used to scan the user's face and unlock the device. It may
seem pretty cool that mobile devices have this technology, and it really is. However, the technology is
somewhat lacking and can be fooled relatively easily. For example, a simple photo of the device's owner
can be used to trick facial recognition. And by printing a picture of the owner's fingerprint using a simple
laser printer, fingerprint recognition can be fooled. Because of this, biometric authentication probably
shouldn't be used for mobile devices that contain highly sensitive information.

PIN
Probably the most common lock screen authentication method is using a PIN. It's very similar to the
authentication method used by debit cards. The user needs to enter the correct four numbers in order to
unlock the mobile device.

Using a PIN for authentication's actually relatively secure. There are 10,000 possible combinations using
a four-digit PIN. And a PIN can be memorized very easily, reducing the need to write it down somewhere.
But a PIN does have some drawbacks. For example, a PIN can be shouldersurfed somewhat easily. A
person doesn't even need to see the exact numbers being pressed, simply the location of the press.

Pattern Unlock

Another method of screen authentication is specific to the mobile devices that use the Android OS and is
called pattern unlock. With this authentication method, the user creates a line pattern on a nine-point grid
which looks something this. To unlock the device, the user then has to provide the exact same pattern.
Pattern unlock is actually harder to shoulder surf than PIN authentication.

Passcode

However, it's much easier to guess.

The last method we'll look at is the passcode authentication, and it's potentially the most secure
authentication method. Passcode authentication uses a user-defined password to unlock the device. The
password can be a mix of letters, numbers, and symbols.

Now, I say it has the potential to be the most secure because, let's face it, some people don't put a lot of
thought into their passwords. So, if the passcode is 1-2-3-4, or the word "password," the device won't be
very secure.

Failed Login Attempts

So, we have all these lock screen authentication methods, all of which prevent someone from accessing
the mobile device. Well, what if someone really wants to get the information contained on the device?
What's to stop them from entering all 10,000 possible PIN combinations until the right one is found?

Luckily, most mobile devices are configured by default to only allow a set number of failed login attempts,
which is usually 10. If more than 10 failed logins are attempted, the mobile device will automatically wipe
the entire contents of the device and reset it to the factory defaults.

It's important to make sure that this feature is enabled on all mobile devices. This is one of the best lines
of defense you can provide to a mobile device. Even if the passcode or PIN aren't very secure, it will be
pretty hard to guess the right one with only 10 attempts at your disposal.

Device Encryption
Another line of defense that can be implemented and is used by default on most new devices is
encryption. Encryption prevents someone from accessing the stored information in any capacity. This
means even if someone gets ahold of a device and were somehow able to copy the content of the device,
they wouldn't be able to view any of the information. It would be encrypted.

There are two types of encryption methods used by mobile devices. The first is partial device encryption.
With this method, only the sections of the device's storage that contain files are encrypted. This type of
encryption is fast, but it doesn't encrypt deleted files, which can be recovered using software.

The second method is full device encryption. This method encrypts every single sector of the device's
storage, regardless of whether it is data or not. This protects the entirety of the device, including deleted
files.

If a mobile device doesn't encrypt contents by default, it's important to make sure that full device
encryption is enabled and configured.

There are two more security features used by mobile devices that you should be aware of, and they are
both used in situations where the device has been lost.

Remote Wipe

The first is called remote wipe. Remote wipe is used to remotely format a mobile device. It's a feature
that's built into a lot of mobile devices, especially smartphones, but it's also possible to use third-party
software, such as Windows Intune, to achieve this functionality. Remote wipe requires some sort of
connection to the device. This means, in order to send remote wipe command, the device needs to be
powered on and have cellular or Wi-Fi connection.

Device Locator

The second feature is a device location service. A lot of smartphones and even some tablets have a
device location feature to locate a lost or stolen device. This feature is usually a proprietary service
specific to the device manufacturer. However, there are also third-party apps that offer location services.

If the service has been set up on a device, the owner can use a website or software application to identify
the approximate location of the device on a map. The service can even do some pretty cool things, like
tell the device to take a picture with both the front and back cameras, then send the pictures to you. This
can further you identify the device's exact location.

The find my device feature does have some limitations. Because this feature uses GPS, the device needs
to have a GPS signal. If the signal can't be found, the device can't be located. The device also needs to
be powered on. This means that if the battery dies or if the person who stole it turns the device off, then it
cannot be located. And if the SIM card is taken out or the device is wiped, either from remote wipe or from
too many failed login attempts, then the device location services won't work.

Summary
So, those are some ways that you can secure a mobile device. To review, in this lesson, we looked at the
different ways you can secure the information on a mobile device. We looked at the different lock screen
authentication methods, the failed login attempt features and the two types of device encryption. And we
finished by looking at the remote wipe and device locator services.

Mobile devices are used for everything from making phone calls to managing bank accounts,
and everything in between. As such, they pose a unique security threat. A single smartphone
sometimes contains more personal information than a desktop computer. And all that
information is in a device that can be lost essentially anywhere. The following table lists
methods for securing your mobile device:

Security Method Description

To secure access to a mobile device, such as a tablet or


smartphone, configure the device's lock screen to use some
sort of authentication. Several different types of lock screen
authentication methods include:

Swipe lock. Most mobile devices are configured to use


a swipe lock screen. This means that anyone can
unlock the device with a simple swipe of the screen;
there's no authentication at all. For obvious reasons,
this is not very secure.

Biometric locks. The two most common biometric locks


are fingerprint and facial recognition. With fingerprint
recognition, the finger of the user is scanned and
Screen locks used to unlock the device. With facial recognition, the
device's camera is used to scan the user's face and
unlock the device.

PIN. A PIN allows user to enter the correct four or six


numbers in order to unlock the mobile device.

Pattern Unlock. Pattern unlock allows the user to


create a line pattern on a nine point grid, used to
unlock a mobile device.

Passcode. Passcode authentication uses a user-defined


password to unlock the device. The password can be
a mix of letters, numbers, and symbols

Biometric Biometric authentication is a type of authentication that relies


on the unique physical characteristics of individuals to verify
their identity for secure access. Some mobile devices support
authentication
biometric authentication on lock screens. The two most
common ones are fingerprint and facial recognition.

Multifactor authentication is a type of authentication that


requires multiple authentication credentials to verify the
Multifactor
user's identity for a login or other transaction. For example,
authentication
you might require a user to enter a username, password, pin,
and fingerprint before authenticating to a computer system.

Most mobile devices are configured by default to only allow a


set number of failed login attempts, which is usually ten. If
more than ten failed logins are attempted, the mobile device
will automatically wipe the entire contents of the device and
Failed login reset it to the factory defaults.
attempts It's important to make sure that this feature is enabled on all
mobile devices. This is one of the best lines of defense you can
provide to a mobile device. Even if the passcode or PIN aren't
very secure, it will be pretty hard to guess the right one with
only ten attempts at your disposal.

Device encryption Another line of defense that can be implemented, and is used
by default on most new devices, is encryption. Encryption
prevents someone from accessing the stored information in
any capacity. This means even if someone got a hold of a
device and were somehow able to copy the contents of the
device, they wouldn't be able to view any of the information. It
would be encrypted. There are two types of encryption
methods used by mobile devices:

Partial device encryption. With this method, only the


sections of the device's storage that contain files are
encrypted. This type of encryption is fast, but it
doesn't encrypt deleted files, which can be recovered
using special software.

Full device encryption. This method encrypts every


single sector of the device's storage, regardless of
whether it has data or not. This protects the entirety
of the device, including deleted files. If a mobile
device doesn't encrypt contents by default, it's
important to make sure that full device encryption is
enabled and configured.

Remote wipe is used to remotely format a mobile device. It's a


feature that's built into a lot of mobile devices--especially
smartphones--but it's also possible to use third-party
software, such as Windows Intune, to achieve this
Remote wipe
functionality. Remote wipe requires some sort of connection
to the device. This means that in order to send a remote wipe
command, the device needs to be powered on and have
cellular or Wi-Fi connection.

Many smartphones and tablets have a device location feature


to locate a lost or stolen device. This feature is usually a
proprietary service specific to the device manufacturer;
however, there are also third-party apps that offer location
services.
Device locator If the service has been set up on a device, the owner can use a
website or software application to identify the approximate
location of the device on a map. The service can also tell the
device to take a picture with both the front and back cameras,
then send the pictures to you. This can further help identify
the device's exact location.

Remote backup Remote backup applications allow you to recover important


applications business data and personal files (e.g., pictures and texts) from
a lost, stolen, or broken phone. Most cellular providers offer
some type of cloud backup service. In addition, each mobile
OS offers their own proprietary backup service:

iOS devices have two different backup tools:

o The desktop application iTunes can be used


to backup and restore iOS devices. iTunes
requires mobile devices to be connected to
the desktop computer via a USB cable.

o Apple devices can also use the iCloud service


to backup and synchronize files and settings
across all Apple devices (i.e., mobile and
desktop devices). iCloud is a cloud-based
backup service and requires the user to have
an Apple ID, which needs to be logged in and
configured on each Apple device. Apple
devices can then synchronize and backup
files over the Internet.

Android devices use the Google sync service to sync


and backup mail, contacts, calendar, and files across
all android devices. Google sync is a cloud-based
service and requires a Google account.

Windows Mobile devices have two backup tools:

o OneDrive is Microsoft's cloud-based backup


service and requires a Microsoft account.

o Windows Mobile devices can also be backed


up using a desktop computer with the
Windows OS installed.

An authenticator application is a specialized app called an


"authenticator." The app is pre-set by you to work with the
service and provides a constantly rotating set of codes that
you can use to utilize two-factor authentication or verification.
The codes in authenticator apps sync across your accounts
Authenticator
and provide an extra layer of security. For example,
applications
implementing two-factor authentication on your Gmail
account would require you to use your username, password
and one of the generated codes from the authenticator apps
to log in to your Gmail account. It may take a little longer to
log in, but it provides you with an added layer of security.

Always keep the device's operating system up-to-date.


Hackers are constantly trying to find new ways to exploit
various technologies, and mobile devices are no exception.
OS updates and These exploits can be anything from relatively harmless
patches adware to dangerous Trojans that take complete control of a
device. The way a device receives an update depends heavily
on the type of mobile device, the manufacturer, and, if it's a
smartphone or the cellular carrier.

Trusted vs untrusted Applications for mobile devices can be placed into two
categories: trusted and untrusted.

Trusted apps are those that have been reviewed and


approved by the device's app service. When
approved, the app is signed with a certificate that
identifies it as a trusted app. For the most part, this
means the app is safe to install and does not contain
malicious code.

apps
Untrusted apps are those that have not been verified
and approved by the app service. While it's possible
that an untrusted app could be entirely safe, it's just
too risky to install one. In fact, most devices won't
allow them to be installed by default. Software for
mobile devices should be restricted to trusted app
stores such as Google Play, the Microsoft Store, or
Apple App Store.

It is a good idea to install an antimalware app on mobile


devices, especially devices that are used by an organization or
Antivirus/Antimalwa
connect to a company network. This will protect the device
re
from malicious email attachments, downloads, or applications.
It will also help prevent the spread of viruses onto a network.

Use a firewall to inspect network traffic and to allow or block


Firewalls
traffic based on a set of rules.

Prevent unintended Some mobile devices are configured to automatically connect


connections to open Wi-Fi networks or accept other types of wireless
connections (e.g., Bluetooth). This presents a serious security
threat. For example, if a mobile device were to connect to an
AP owned by a malicious individual, any information sent by
the device can be captured by the malicious person.

To prevent against unintended Wi-Fi connections:

o Configure Wi-Fi settings to always ask for


permission to connect to unknown wireless
networks.

o If Wi-Fi is not being used, consider turning off


the Wi-Fi adapter.

o If a mobile device has already connected to


an unknown wireless network, remove the
network from the saved networks list in
order to prevent future connections.

To prevent against unintended Bluetooth pairing:

o Unless Bluetooth is actively being used, turn


it off. This will not only prevent Bluetooth
pairing and discovery, but also increase the
device's battery life.

o If a the mobile device has been accidently


paired with another device, navigate to
Bluetooth settings and delete (unpair) the
device.

Policies and Use policies and procedures to secure your mobile devices.
procedures
BYOD vs. corporate owned. Some organizations
implement security policies that forbid users from
connecting their personal mobile devices to the
organizational network (wired or wireless). Some
organizations allow mobile devices; in fact, they may
even provide users with mobile devices. However,
there is a risk in this situation that company data may
be copied to these devices that could be
compromised if a device is lost. As a safeguard, many
of these organizations require that remote wipe be
enabled on the device so that if it is lost or stolen, a
command can be sent remotely to the device to
remove all data on it.

Profile security requirements. Utilize an Acceptable


Use Policy to specify how users:

o Connect their personally-owned mobile


devices to the organization's wireless
network. If they can, it may also specify rules
for what Internet resources they are allowed
to access using those devices.

o Use company-owned computers for personal


uses, such as shopping for personal items on
ecommerce websites.

In addition to policies, mobile devices can be secured by using


special Mobile Device Management (MDM) tools, which allow
for remote management of multiple mobile devices. By using
an MDM tool, an IT administrator can:

Test configuration settings before deploying them.

Create and enforce mobile device security policies.

Remotely wipe mobile devices.

Push OS updates to devices.


Device management
The specific MDM you use depends on the mobile device's
operating system.

iOS devices use the Apple Configurator tool.

Windows Mobile devices use the Microsoft Intune tool,


which is a cloud-based mobile management app.

Android devices can be managed using a variety of free


or paid third-party MDM tools, including the Microsoft
Intune tool.

Securing Mobile Devices

In this demonstration, we're going to discuss mobile device security. Specifically, we're going to look at a
few things you can do to increase the overall security of an iPad running the iOS operating system.

Passcode Locks
Let's begin by discussing passcode locks. I'm going to go to settings and then I'm going to tap on
Passcode. Now, you can use passcodes on your iPad to protect the information stored on the device.
Now, if you set a passcode, then every time the user either powers on the device or wakes it up, the user
will be prompted to enter the passcode that you set before they can run any apps or access any of the
information on the device. And that's a really good idea in case you, for example, forget and leave this
device in a taxicab, hotel, train station or airport. We don't want folks to be able to pick up the device and
have full access to whatever's on it.

So, to do this, we need to turn passcodes on. Notice that, right now, passcodes are currently turned off.
Let's go ahead and tap Turn Passcodes On, and then we're prompted to set a new passcode. I'll go
ahead and do that. And then we're prompted to re-enter it. So, at this point, we have a passcode set.
Now, the end user will be prompted to enter that passcode whenever they try to wake it up or power it on,
basically, whenever they need to unlock the screen.

Auto Lock

In addition, we can also specify how long this device can be idle before we're going to require the
passcode to be re-entered. So, first of all, we need to go back to our general screen. And then, on the
general screen, we need to locate Auto-Lock right here. Notice that currently Auto-Lock is set to Never,
which basically means that this iPad can sit idle forever if we wanted it to. And hence, the user will not be
required to re-enter the passcode.

Let's change that. I'm going to tap on Never. And let's set the auto-lock for two minutes. Go back. Now, if
this iPad sits idle for 2 Minutes, meaning I'm not tapping anything, then the screen is automatically going
to lock.

Now, let's go back to passcode locks here. And I do need to enter the passcode that I just set to do so.
Notice that there's an option here called Require Passcode. Currently, it's set to require the passcode
after 15 minutes. Note here on the screen, it tells us that shorter times are more secure. Let's go ahead
and crank this down to one minute. This gives us a little bit of leeway if we're using the device so we're
not constantly re-entering the passcode. But if this sits for one minute, then we are going to have to re-
enter the passcode.

Okay, so to this point, we've enabled a passcode, we've set our screen to automatically lock after two
minutes and we're going to require the end user to re-enter that passcode if the device has been idle for
one minute.

Erase Data

So, at this point, we've increased the security quite a bit on this device.

However, there are other things we can do. For example, notice at the bottom of this screen, there's an
option called Erase Data. This is kind of a nuclear option. If I turn erase data on, then all of the data on
this iPad will be erased if the end user tries to enter a passcode and they do so incorrectly 10 times in a
row. After 10 consecutive failed passcode attempts, all of the data on this iPad is going to get erased.

Let's turn that option on. And it warns us, "Hey, if you turn this option on, then everything on this iPad is
going to be erased after 10 failed passcode attempts." We're going to go ahead and say, "Yep, we know.
Let's enable it."
Now, this is a powerful option, and you actually have to decide whether you want to have this option
turned on or not because if you have it turned on and you or somebody else enters the wrong passcode
10 times in a row, then you're going to have to restore all the data on this iPad from backup, either from
iTunes on a PC using a USB cable or pulling it down from iCloud.

Basically, what we're assuming is that if somebody enters the wrong passcode 10 times in a row, it isn't
their iPad. It belongs to somebody else and they're trying to break in. Therefore, we're going to wipe any
useful information off of the device in an attempt to prevent them from gaining access to it.

Complex Passcodes

So, at this point, we've really increased the overall security of this device. However, there's still a couple
more things we can do. One of those has to do with the nature of the passcode itself. Notice here that the
option for simple passcodes is currently turned on. In fact, it's on by default. That's why I only had to
configure a four-digit passcode number.

Well, honestly, a four-digit passcode number really isn't all that secure. It's just too short and the
characters you can use are really limited. Basically, you can only use numbers. That makes passcodes a
lot easier to guess.

To further increase the security of this device, we can actually turn simple passcodes off. Now, when I do
this, I have to provide my old simple passcode. And now, I'm allowed to enter in a new passcode, but this
passcode is different. It can be longer and it can include both numbers and letters. This makes passcodes
much more difficult to guess.

Let's enter in a new passcode. Tap Next, now I have to re-enter that passcode again. And now I'll tap
Done, and now I have a much more complex passcode set. And now, this new passcode will be much
more difficult to guess than the simpler four-digit passcode we were using.

Locating a Lost Device

Another aspect of mobile device security involves being able to track down a lost device because, frankly,
these devices do get lost. They get lost all the time. People leave them on airplanes, they get left in hotels
and taxicabs and elevators and train stations. And if this happens, you not only want to protect the data
on the device, but you also probably want to figure out where that device is.

Many mobile devices provide functionality that you can use to locate the lost device. Now, the iOS
operating system running on this iPad provides a function called Find My iPad, and it's tied to the iCloud
backup function. If we enable this function and then we lose this iPad, we can then sign in to iCloud from
any web browser on a PC or a laptop system and then use the Find My iPad option to view the
approximate location of the iPad on a map.

To do this, we need to tap on iCloud, and then scroll down a little bit. Notice down here that the Find My
iPad option is already turned on. By doing this, we have a lot of options. Not only could we view the
approximate location of the iPad on a map by going to iCloud.com, we can do a lot of other things too.

For example, we could have a message displayed on the iPad telling whoever finds it how to get ahold of
you. You could even use iCloud.com to go in and remotely change the passcode lock assigned to this
device. And if you're really concerned about not losing the data on a lost device, then you can actually
use iCloud.com to perform a remote wipe.

Now, this is a meat cleaver approach. Essentially, what we're doing with a remote wipe is assuming that
the iPad is lost and that the person who found it has no intention of returning it and they may actually
want to get at the information that's stored on it. In this case, you can use iCloud.com to send a remote
wipe command to the iPad, which will then restore the iPad to its original factory settings. Any personal
information on it, as well as any proprietary sensitive information belonging to your organization, gets
wiped out.

And if you have this option turned on, it's not a bad idea to come over here under Backup and turn on
iCloud Backup as well. I'm going to tap OK. The idea here is that if you ever do end up needing to perform
a remote wipe or if you end up just losing the iPad altogether and never getting it back, then you can
restore all the data from your old iPad onto a new iPad. Go ahead and tap Cancel for now.

Summary

That's it for this demonstration. In this demo, we talked about some things you can do to increase the
overall security of a mobile device, in this case, an iPad. We began this demonstration by talking about
how to set passcode locks, we talked about how to set the auto-lock feature of the iPad, we talked about
wiping the data off of the iPad if somebody enters the wrong passcode more than 10 times in a row, and
then we ended this demonstration by talking about how to locate a lost device using the Find My iPad
option using iCloud.

Mobile Device Troubleshooting

In this lesson, we're going to take a look at the various problems that are specific to mobile devices, and
the steps you can take to troubleshoot common issues.

Now, before we begin, it's important to note that there are a lot of differences between mobile devices.
This is especially true with Android devices. The exact same Android OS version can look entirely
different depending on the smartphone manufacturer.

However, even though there are differences, the troubleshooting techniques we'll talk about in this lesson
can be used regardless of the mobile OS or phone manufacturer, and when in doubt, refer to the device
manufacturer's documentation on how to fix a particular issue.

Display Issues

Let's start with the display on a mobile device. Because of their mobile nature, mobile devices are prone
to being dropped. The damage caused from dropping a device can range from a minor scratch to a
completely broken display and screen.

If a mobile device is having display issues, the first thing you should identify is whether or not the display
was dropped recently, even if there is no physical damage. This is because sometimes even a fall that
results in no external damage can still cause internal damage. If the display does have cracks or physical
damage, chances are the entire screen has failed and needs to be replaced.

Before replacing the screen entirely however, make sure the device is on and fully charged. Sometimes
the display not working is as simple as the device not being turned on. Another thing to check for is the
display's brightness.

Most mobile devices have an auto-brightness setting that changes the screen's luminance depending on
the ambient light. It's possible the auto-brightness was accidentally disabled and the screen is at the
lowest brightness setting.

Touchscreen Issues

To rule this out, look at the screen in an area with very little light.

Another issue related to the screen has to do with the touchscreen functionality. If the touchscreen is not
being responsive, or the touching accuracy is off, there are a couple of things you can look at.

First, remember that mobile devices use capacitive touchscreens. This means a conductive material,
such as a finger, needs to contact the screen for a tap to be recognized. As such, wearing gloves, or
using nonconductive utensils will cause the touchscreen to not function.

Conductive touchscreens can also be affected by even the smallest amount of liquid on the screen. A tiny
drop of water can cause the touchscreen to behave erratically or not work at all, so make sure the screen
is clear of any moisture.

A cracked or damaged screen can also cause touchscreen problems. If this is the case, the screen should
most likely be replaced. This is especially true if the screen is made of glass, as not only will the
touchscreen not work, but it's very easy for the cracked edges to cut a finger.

If there is no physical damage, but the screen seems to respond inaccurately, it's possible that the screen
needs to be calibrated. To do this, enter the configuration settings of the device and follow the calibration
steps, which usually involves tapping specified areas on the screen multiple times.

Battery Issues

Another area of concern for mobile devices is the battery. Not only can the battery cause several
problems, but it can also be used to identify other non-battery related issues.

For example, let's say a mobile device's battery is being drained a lot faster than normal. One initial
reaction is to replace the battery with a new one, but what if the problem wasn't actually the battery, but it
was instead due to the fact than an installed app on the device was always running and consuming
resources? In this situation, a new battery wouldn't fix this issue. Because of this it's important to be able
to identify whether a battery is faulty or not.

A swollen battery is probably the easiest way to identify a bad battery. If the battery is bulging at all, it
needs to be replaced immediately. If not replaced, the battery could explode and even cause a fire.
If there are no physical abnormalities, try to identify how old the battery is. Most smartphone batteries only
have a lifespan of about a year. After that, the amount of charge they can hold is drastically reduced.

If the battery is new and has no physical abnormalities, the battery drain could be a result of too many
running apps. Many mobile devices actually have a battery usage history that can be used to identify
which apps are consuming the most battery power. You can then uninstall or disable the culprit if
necessary.

Performance Issues

Performance issues are another problem that can occur with mobile devices. If the device seems to be
running slow, there are a couple of things you should look for.

First, identify the system resources and usage. Check how much memory running applications are
consuming, and disable any unnecessary apps. One indication of high resource usage is the mobile
device being warm or hot to the touch, which indicates the device is doing a lot of processing.

Second, check to see if the device is attempting to run applications that are intended for newer devices.
Even though an app can be installed on an older device, it doesn't mean the device will be able to run it
properly. Just like desktop computer applications, mobile device apps have recommended hardware
specifications.

Third, check the device's storage usage. If the mobile device storage is more than 80% full, performance
can be reduced considerably. If this is the case, uninstalling unnecessary and unused apps can help
speed up performance.

Connection Issues

Connection issues are another area where mobile devices can have problems. Not only do most mobile
devices connect to a cellular carrier server, but they also use Wi-Fi, Bluetooth, and GPS technology for
communication.

When troubleshooting connection issues, make sure the device is not in airplane mode. In this mode,
cellular service is disabled, and other wireless connections are also typically disabled.

Make sure that the wireless technology in question is properly enabled. GPS, Wi-Fi, and Bluetooth can all
be turned off on mobile devices to conserve battery power, or to protect the device from unwanted
connections.

Make sure that the device has a solid connection to the service in question. For cellular connection
problems, check the level of connection, 1X, 3G, 4G, etcetera, and the number of bars which indicates
the signal strength.

For Wi-Fi, make sure the device is connected to the access point and has a solid connection. If the single
seems to be intermittent, try installing and using a Wi-Fi analyzer app to identify the signal strength and
interfering signals.
For GPS to function properly, the device needs a line of sight connection to satellites in orbit. If there are
obstructions such as a large building, the connection won't work properly,

and most Bluetooth devices need to be paired with each other by entering discovery mode and using a
special code. If pairing hasn't been configured, devices won't be able to communicate with each other.

Frozen Device

Occasionally you may run into a problem that requires the device to be restarted, such as a frozen app, or
the device itself is locked up. If this is the case, there are two ways to reboot a mobile device. The first,
and preferred method, is to do a soft reset.

With a soft reset, you hold the power button on the device, and depending on the device, the device will
reset, or the power options dialog will appear, giving you the option to shut down or restart the device.

The second method is a hard reset, which should only be used if a soft reset doesn't work. With a hard
reset, the device's battery is typically removed and then reinserted. If the device's battery can't be
removed, a hard reset is performed by holding a combination of buttons on the device until it powers off.

Summary

Those are just some of the issues you may encounter when working with mobile devices. Remember,
mobile devices vary by both manufacturer and operating system, so the configuration and troubleshooting
steps for one device might be completely different for another.

However, by understanding the basics we've talked about in this lesson, you should be able to
troubleshoot any mobile device you encounter.

Mobile devices present a unique challenge for troubleshooting. Because of their mobile nature,
they are prone to a variety of problems that can manifest in various ways. The following tools
can be used to help troubleshoot mobile devices:

Tool Description

App An app scanner is a tool that can be used to identify problems with
scanner installed apps.

When installed, the app scans all installed apps on the mobile
device and uses a definitions list to identify any issues.

App scanners can be configured to automatically scan the


mobile device on a specified schedule.
Because app scanners use a definitions list to identify problems, it is
important that the list is always kept up to date.

Wi-Fi analyzers are special apps that can be used to troubleshoot Wi-Fi
connectivity issues. Most Wi-Fi analyzer apps provide the following
functionality:

Identify the number of APs that are broadcasting


Wi-Fi
analyzer
Display the signal strength and channel of each wireless network

Obtain wireless network information (e.g., signal band, SSID,


security mode, etc.)

A cell tower analyzer can be used to troubleshoot cellular network


connectivity by displaying the following information:

Signal strength/interference

Cell tower Number of cell towers in the area


analyzer
The location of each cell tower

Mobile network information (e.g., network type, data activity,


service provider, etc.)

The following table describes some of the most common mobile issues and the steps you can
take to identify and fix the problem:

Issue Description

No display A mobile device's display can stop working for a several reasons. If
you are troubleshooting a mobile device with a display issue, consider
the following:

Make sure the device is fully charged and powered on. It is


possible that the device is powered off or the battery is
drained.

Check the device's brightness level. If the brightness level is


too low, it may appear as though the display is off; look at
the screen in a dark room to make sure this isn't the case.

Find out if the device was dropped. When a mobile device is


dropped, it is possible for the screen to be damaged, even if
there is no physical damage.

Look for physical damage. If the screen is cracked or the


device has physical damage, the display is most likely broken
and needs to be replaced.

Mobile devices use capacitive touchscreens, which require a


conductive material touching the screen to work. If the touchscreen is
not functioning or is inaccurate, you should:

Look for liquid on the screen. Because water is conductive,


any type of moisture on the screen will result in erratic
touchscreen behavior.
Non-
responsive
Check for cracks or physical damage. A cracked screen can
touchscreen
disrupt the current flow across the screen and cause specific
sections of the touchscreen to fail.

Make sure the screen is calibrated. If the touchscreen is


inaccurate, try calibrating it using the device's built-in
calibration app.

Unauthorize Mobile devices are vulnerable to many of the same attacks that target
d access desktop systems. One such attack is unauthorized access, where an
attacker gains access to a specific feature or functionality of the
mobile device.

Unauthorized account access occurs when an attacker obtains


the login credentials for a cloud backup service or the device
itself. This can result in leaked personal file and data. To
protect against this, make sure to use some sort of
authentication on the mobile device. Also make sure to use
complex passwords and, if possible, set up two-factor
authentication with all accounts that contain sensitive
information.
Unauthorized root access is typically the result of a virus or
malicious program being installed on the mobile device. With
root access, the malicious program can make low-level
system changes to the mobile device, including modifying
root certificates. To protect against unintended root access,
install a antimalware app on the mobile device and keep it
up to date.

Unauthorized location tracking occurs when the GPS on the


device is being used to track your location without your
permission. To protect against this, review the device's
security settings and identify which installed apps have
access to location services. You can then modify each app's
permissions to deny location tracking access.

Unauthorized camera/microphone activation is when the


device's camera or microphone are being used without the
user's permission. This can be caused by a malicious
program or individual or it could be caused by an installed
application that has been granted permission to use these
services. Most mobile devices have an LED or icon that
indicates if the camera is being used. If a camera is being
used without permission, review the device's security
settings and app permission settings. In addition, you can
install an antimalware app and run a scan on the device to
remove any malicious apps.

Weak or no Most connectivity issues are a result of a weak signal or some sort of
signal interference. If a mobile device is having connectivity problems, try
the following:

If the device is having problems connecting to a wireless


network:

o Make sure the wireless adapter is turned on.

o Verify that the wireless configuration settings are


correct.

o Use a Wi-Fi analyzer to identify the network's signal


strength as well as interference sources (e.g., other
network signals).

If the device is having problems with cellular service:

o Make sure the mobile device has a SIM card is


installed.

o Use a cell tower analyzer to identify network


coverage, signal strength, and network type (i.e., 1x,
3G, 4G).

o Identify whether or not the mobile device has a data


plan. If it does, make sure the device has not gone
over the data limits specified in the plan.

If the device seems to be running slow, there are a couple things you
can look at in order to identify the problem:

Identify system resources and usage. Many mobile devices


have a system monitor that can be used to identify which
apps are using system resources (i.e., memory, processor,
etc.).

Slow/poor
Make sure the app being used is compatible with the mobile
performance
device. Older mobile devices have slower processors and
might not be able to run all the latest mobile apps available
to it.

Check the amount of free storage on the mobile device. If a


mobile device's storage is more than 80% full, performance
can be reduced considerably.

You might also like