3.5 Implement Secure Mobile Solutions Flashcards
Mobile network connection used to connect two locations using directional antennas
Point to point
What are the three main concerns with NFC security?
Remote capture
Jamming
Replay attacks
Management practice that allows a company centralized management of all mobile devices across the organization.
MDM (Mobile device Management)
What can a manager use to control the apps that can be installed on mobile devices?
Allow list
What is a mobile content management (MCM)?
Used to secure and protect data on mobile devices
The concept of combining multiple scenarios together as a method of authentication (i.e. where you login from, where you are geo-located, Bluetooth pairings)
Context-aware authentication
Process of creating separate partitions on a mobile device to separate personal and business info. Great for offboarding employees.
Containerization
How can you protect data on a mobile device to where even if the device is lost, the attacker cannot access any of the data?
Full device Encryption (FDE)
HSM that can be used in a mobile device to provide encryption, key generation, and digital signatures.
MicroSD HSM
Management system that allows you to manage security postures across mobile devices and workstations. Allows apps to be shared across multiple platforms.
Unified Endpoint Management (UEM)
Management system that allows you to manage apps running on mobile devices by monitoring, provisioning, and wiping data.
Mobile application management (MAM)
Security policies and access control that applies to Android operating systems. Prevents malicious activity and changed from DAC to MAC.
SEAndroid
What does it mean for a device to receive updates OTA?
Over the air, no physical connection required
What is USB OTG?
USB on the go, allows two devices to directly connect to each other
What type of connection is often found in IoT devices that allows you to connect to them via a wifi connection for setup?
Wifi Direct