O'Reilly logo

Official (ISC)2 Guide to the CISSP CBK, Fourth Edition, 4th Edition by Adam Gordon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image

Appendix D

Domain 3 Materials

The following example mobile device security policy is referenced in Domain 3 – Security Engineering. You can download the materials from this appendix for free by going to the following link:

https://learning.isc2.org/content/cissp-textbook-appendices

Example Mobile Device Security Policy

Using this Policy

One of the challenges facing IT departments today is securing both privately owned and corporate mobile devices, such as smartphones and tablet computers. This example policy is intended to act as a guideline for organizations looking to implement or update their mobile device security policy.

Where required, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required