Placeholder Image

Subtitles section Play video

  • Hello and welcome to the Information Security Awareness Program created by Information Technology Services at Cincinnati State.

  • This program’s primary focus is to inform the college community regarding information security topics,

  • so you can do your part to keep our data and systems safe.

  • This video, Mobile Devices, is part of a collection of videos that make up the Information Security Awareness Program.

  • You can find the entire Information Security Program online at www.cincinnatistate.edu/InformationSecurity

  • This video will cover the following four topics:

  • 1) Mobile Device Overview

  • 2) Smartphones

  • 3) Tablets

  • 4) Laptops

  • In many cases, a mobile device is a handheld computer.

  • These devices are designed for portability, often fitting in the palm of your hand or in your pocket.

  • The more powerful mobile devices allow you to do many of the same things you can do with a desktop computer such as:

  • E-mail, contacts, calendar, files, and browsing the internet.

  • These types of devices often provide the same level of connectivity as desktop computers and require the same security.

  • Smartphones perform many desktop computer functions. They store confidential College information in files, emails, etc.

  • Characteristics of a smartphone include: telephone services, access to networks (data plan or wifi), usually require a data package,

  • short battery life, large selection of apps, touch screen, & conducive for light keyboarding only.

  • The Apple iPhone, HTC Android, and Blackberry Bold are examples of smartphones.

  • A tablet is simply a more convenient portable computer. They perform many of the same functions of a laptop,

  • and have characteristics laptops don’t. Tablets can store confidential College information in files, emails, etc.

  • Characteristics of a tablet include: telephone services, access to networks (data plan or wifi) fast "power-up" compared to a laptop,

  • longer battery life, large selection of apps, touch screen, conducive for light to mid keyboarding only.

  • The Apple iPad and Samsung Galaxy are examples of tablets.

  • Laptop computers were the first wide-spread mobile device. It allowed organizations to send their workforce on the road but still

  • remain connected to corporate systems. Laptops have the most computing power of the mobile devices listed in this video.

  • Characteristics of a laptop include: Full computing power of a desktop, full access to all organizational applications,

  • access to networks (network jack or wifi) can include organizational IT support including virus and software updates,

  • slowpower-upcompared to tablet, short battery life, conducive for heavy keyboarding.

  • Laptops are the heaviest mobile device listed in this video.

  • The Dell Netbook and Apple MacBook are examples of laptops.

  • If you have questions regarding this or any other information security topic, call the ITS Helpdesk @ 513-569-1234.

Hello and welcome to the Information Security Awareness Program created by Information Technology Services at Cincinnati State.

Subtitles and vocabulary

Operation of videos Adjust the video here to display the subtitles

B2 security mobile device information desktop laptop wifi

Information Security Awareness - Mobile Devices

  • 143 5
    oulding posted on 2014/05/31
Video vocabulary