Nhlanhla wants to have wireless access in the employee break room and conference room next to her
Question:
Nhlanhla wants to have wireless access in the employee break room and conference room next to her office. However, her employer's IT staff turns down her request for a wireless network. Nhlanhla decides to take the matter into her own hands: she purchases an inexpensive consumer wireless router and secretly brings into her office and connects it to the wired network, thus providing wireless access to the employees in her area.
1) Staff members in Nhlanhla's area have a Bring Your Own Device (BYOD) agreement and setup. These members do bring laptops, smartphones and tablets to perform the organization's duties. Use a plausible example to explain how mobile device management can enforce geofencing to secure mobile device app from the unauthorized access to network?
2)Using a plausible example differentiate between cryptography and encryption?