Please enable JavaScript.
Coggle requires JavaScript to display documents.
(3.3) The different methods that can be used to protect data on the phone …
(3.3) The different methods that can be used to protect data on the phone
2 Factor Authentication
Encryption
Database
MDM
Patch Management
Strong Password
Privacy Screen Filter
Biometrics
Face
Fingerprint
Iris
Body Movement
Safe
Other physical methods
O/S methods
Access management
Training
Remote Working
User Access + Permissions
Antivirus
Firewall