From the course: CompTIA Security+ (SY0-701) Cert Prep

Unlock the full course today

Join today to access over 24,000 courses taught by industry experts.

Mobile connection methods

Mobile connection methods

- [Instructor] In order to secure mobile devices, cyber security professionals need to understand the various ways that mobile devices may gain access to data and connect to resources on other systems. There are quite a few connection technologies available, and each has different uses. Let's take a look at a few important ones. Cellular networks operate in most urban and suburban areas around the world. And in some cases, even in rural areas. These networks were originally used for voice communications, but they then expanded to include data service as cellular telephones made way for smart devices. Cellular networks cover a fairly large area, with a single tower able to serve devices up to 20 or more miles away. Now, the range of a tower depends significantly on the terrain, with towers near highways in the middle of the desert able to reach much farther than towers in a densely populated urban area. Cellular networks are rated according to the generation of service they provide…

Contents