Placeholder Image

字幕列表 影片播放

  • Hello and welcome to the Information Security Awareness Program created by Information Technology Services at Cincinnati State.

  • This program’s primary focus is to inform the college community regarding information security topics,

  • so you can do your part to keep our data and systems safe.

  • This video, Mobile Devices, is part of a collection of videos that make up the Information Security Awareness Program.

  • You can find the entire Information Security Program online at www.cincinnatistate.edu/InformationSecurity

  • This video will cover the following four topics:

  • 1) Mobile Device Overview

  • 2) Smartphones

  • 3) Tablets

  • 4) Laptops

  • In many cases, a mobile device is a handheld computer.

  • These devices are designed for portability, often fitting in the palm of your hand or in your pocket.

  • The more powerful mobile devices allow you to do many of the same things you can do with a desktop computer such as:

  • E-mail, contacts, calendar, files, and browsing the internet.

  • These types of devices often provide the same level of connectivity as desktop computers and require the same security.

  • Smartphones perform many desktop computer functions. They store confidential College information in files, emails, etc.

  • Characteristics of a smartphone include: telephone services, access to networks (data plan or wifi), usually require a data package,

  • short battery life, large selection of apps, touch screen, & conducive for light keyboarding only.

  • The Apple iPhone, HTC Android, and Blackberry Bold are examples of smartphones.

  • A tablet is simply a more convenient portable computer. They perform many of the same functions of a laptop,

  • and have characteristics laptops don’t. Tablets can store confidential College information in files, emails, etc.

  • Characteristics of a tablet include: telephone services, access to networks (data plan or wifi) fast "power-up" compared to a laptop,

  • longer battery life, large selection of apps, touch screen, conducive for light to mid keyboarding only.

  • The Apple iPad and Samsung Galaxy are examples of tablets.

  • Laptop computers were the first wide-spread mobile device. It allowed organizations to send their workforce on the road but still

  • remain connected to corporate systems. Laptops have the most computing power of the mobile devices listed in this video.

  • Characteristics of a laptop include: Full computing power of a desktop, full access to all organizational applications,

  • access to networks (network jack or wifi) can include organizational IT support including virus and software updates,

  • slowpower-upcompared to tablet, short battery life, conducive for heavy keyboarding.

  • Laptops are the heaviest mobile device listed in this video.

  • The Dell Netbook and Apple MacBook are examples of laptops.

  • If you have questions regarding this or any other information security topic, call the ITS Helpdesk @ 513-569-1234.

Hello and welcome to the Information Security Awareness Program created by Information Technology Services at Cincinnati State.

字幕與單字

單字即點即查 點擊單字可以查詢單字解釋

B2 中高級

信息安全意識--移動設備 (Information Security Awareness - Mobile Devices)

  • 143 9
    oulding 發佈於 2021 年 01 月 14 日
影片單字