11A: Recognize Mobile Device Vulnerabilities Flashcards
3.5 Explain common attacks and vulnerabilities against specialized systems
A MDM model where the mobile device is owned by the employee; however, it must be corporate compliant in terms of OS version and functionality. (Answer in 4 letter acronym format XXXX)
BYOD
A MDM model where the device is the property of the company and may only be used for company business. (Answer in 4 letter acronym format XXXX)
COBO (corporate owned business only)
A MDM model where the device is supplied and owned by the company. The employee may use it to access personal email, social media, and web browsing; however, they must be compliant with any acceptable use policies in force. (Answer in 4 letter acronym format XXXX)
COPE (corporate owned personally enabled)
A MDM model that is much the same as COPE; however, the employee can select a device from a curated list. (Answer in 4 letter acronym format XXXX)
CYOD (choose your own device)
A class of management software designed to apply security policies to mobile devices and apps in the enterprise. (Answer in 3 letter acronym format XXX)
Enterprise Mobility Management (EMM)
Software that allows deletion of data and settings on a mobile device to be initiated from a remote server.
remote wipes
Sets device policies for authentication, feature use, such as camera and microphone, and connectivity. This tool can also allow device resets and remote wipes. (Answer in 3 letter acronym format XXX)
MDM (mobile device management)
Sets policies for apps that can prevent unauthorized apps from being installed, automatically push out updates, and enable clients to select from a list of corporate compliant apps to be installed. (Answer in 3 letter acronym format XXX)
MAM (mobile application management)
A threat that can occur when device updates are not implemented in a timely manner.
patching fragmentation