2.3 Mobile and Small Form Factor Devices Flashcards
Analyze scenario to integrate security controls for mobile and small form factor devices to meet security requirements
(Enterprise Mobility Management)
Centralized approach to management provides a consistent and comprehensive way of locking down devices to meet security polisies and compliance requirements while still allowing users to be productive
(Enterprise Mobility Management)
containerization
isolates corporate data into protected and encrypted container stored on the mobile device
(Enterprise Mobility Management)
Configuration profiles and payloads
- Configuration profiles are groups of OS and application setting applieed to various devices inside and outside of an enterprise
- Payloads are the individual settings in the configuration profiles
(Enterprise Mobility Management)
POCE
Personally Owned, Corporate Enabled
-BYOD but with official enterprise onboarding requirements to ensure the device is properly managed
(Enterprise Mobility Management)
Application Wrapping
additional sedurity features added to a mobile appplication that do not modify the underlying functionality of the application itself
(Enterprise Mobility Management)
Remote assistance access
permits helpers to access the user;s device screen, observe settings, and monitor performance, intsall or remove applications, set up email, and configure VPN or wifi services
(Enterprise Mobility Management)
VNC
Graphical desktop sharing tool that permits remote management of other devices.
-Uses Remote Frame Buffer (RFB) protocol for remote assistance
(Enterprise Mobility Management)
MDM
Mobile device management
-often have the ability to create application configuration policies that may permit deployment of applications to include custom configurations and security options
(Enterprise Mobility Management)
Over-the-air Updates
centralized and wireless distribution of new software, firmware, certificates, and encryption keys to mobile devices.
(Enterprise Mobility Management)
Remote Wiping
process of sending a signal to a remote device to erase specified data
(Enterprise Mobility Management)
SCEP
Simple Certificate Enrollment Protocol
-provides an easy process for network equipment, software, and mobile devices to enroll in digital certificates
(Enterprise Mobility Management)
BYOD
Bring Your Own Device
-allows employees to bring in their own personal devices such as laptops, smartphones, and tablets to work in order to access enterprise applications and data
(Enterprise Mobility Management)
COPE
Corporate Owned, Personally Enabled
-company purchases and owns the device and lets employees use them
(Enterprise Mobility Management)
VPN
Virtual Private Network
(Enterprise Mobility Management)
Application Permissions
applications require permissions to use cameras, microphones, call logs, email, etc
(Enterprise Mobility Management)
Side Loading
process of installing applications from sources outside of the app store
(Enterprise Mobility Management)
unsigned apps/system apps
Official apps are digitally singed for their legitimacy by the application developer
(Enterprise Mobility Management)
context-aware management
applies restrictive policies to mobile devices based on certain device conditions like location or time of day
(Enterprise Mobility Management)
Context Aware management - Geolocation
process of determining a devices location by using GPS devices or cell towers
(Enterprise Mobility Management)
Context- aware management - User behavior
can detect when a user’s behavior on a device deviates from a norm
(Enterprise Mobility Management)
Context-aware management - time based restrictions
applies certain security controls on a device based on the time of day