Software on a portable device should be:

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only A$47.99/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (7)

Devices used purely for storage, like USB flash ("thumb") drives and external hard drives:

May expose large amounts of data if compromised, so should also use protections like access passwords or PINs and whole-device data encryption

Software on a portable device should be

Installed or updated only from trusted sources to be certain that it is a legitimate version

External labeling with a physical label, or configuring a device to display the owner's name and contact information on a login screen, is

Generally considered a good idea, because it allows the device to be returned to its owner when found. However, always check organizational policies about the practice

Enabling a device login password or PIN, and an inactivity timeout to force (re)login with that password or PIN after the device is idle for a defined period, is generally considered:

Generally considered essential for any portable device

Compared to fixed location (desktop) computers, physical security for portable devices is:

Generally more necessary, because portable devices tend to be used in physical environments that are inherently less secure

Ensuring data backups for data stored on a portable device is generally considered:

Necessary when the device would otherwise be the only source of hard-to-replace data, but the backup mechanism must also be secure.

Secure communications, like that provided by "encrypted" web connections using https or a Virtual Private Network (VPN), are:

Generally considered essential for smartphones and tablets, because time sensitive information is being accessed, received, or transmitted.

Students also viewed

CITI - HIPS for Investigators (Elective Modules)

37 terms

kfairclo

Citi Protecting Your Identity

7 terms

karrahc

CITI Certification

29 terms

nursemom0814

SEM, Part 1

5 terms

The_Goaht

Sets found in the same folder

Protecting Your Computer

10 terms

Megan_Montalto

Protecting Your Identity

7 terms

Megan_Montalto

Safer Emailing and Messaging PT 1

10 terms

Megan_Montalto

Safer Emailing and Messaging PT 2

9 terms

Megan_Montalto

Other sets by this creator

EMT-B Basic Final Exam Review

139 terms

Megan_Montalto

ATC BOC Practice Questions

77 terms

Megan_Montalto

Referred Pain Patterns

9 terms

Megan_Montalto

Equipment Quiz#1

15 terms

Megan_Montalto

Recommended textbook solutions

Software on a portable device should be:

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Software on a portable device should be:

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Software on a portable device should be:

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Software on a portable device should be:

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

Other Quizlet sets

Chapter 5 Financing Programs

29 terms

sknewell1Plus

Psych ch 6

11 terms

akdopeness

HOD 1100 Quiz #3

61 terms

isabelx24

Anatomy of Bony Pelvis, Joints, & Suppor…

136 terms

reagan_jefcoat

How a portable or removable device can be protected from theft when not in use?

Data encryption in the portable device is an effective measure to prevent unauthorised access to data in case of loss or theft. It is important to remember that personal data, although encrypted, is still data of a personal nature.

Which of these is a greater risk off site than when a computer is used in a protected office environment quizlet?

Such notices should be included if an organization's policies require it, but cannot be counted upon as legal protection. Which of these is a greater risk "off site" than when a computer is used in a protected office environment? Human threats - such as theft.

Which of the following is good security practice for email?

Create strong passwords One of the most important email security best practices is to use strong passwords.