Chapter 10 - Mobile And Embedded Device Security Flashcards
ANT
A proprietary wireless network technology that is used primarily by sensors for communicating data.
Bring your own device (BYOD)
Allows users to use their own personal mobile devices for business purposes.
Corporate owned, personally enabled (COPE)
Employees choose from a selection of company-approved devices.
Choose your own device (CYOD)
Employees choose from a limited selection of approved devices but the employee pays the upfront cost of the device while the business owns the contract.
Virtual desktop infrastructure (VDI)
Stores sensitive applications and data on a remote server that is accessed through a smartphone.
Corporate-owned
The device is purchased and owned by the enterprise.
Geolocation
The process of identifying the geographical location of a device.
GPS tagging
Adding geographical identification data to media such as digital photos taken in a mobile device.
Quick response code (QR)
A matrix or two dimensional barcode which can be read by an imaging device such as a mobile devices camera.
Jailbreaking
Circumventing the installed built-in limitations on Apple iOS devices.
Rooting
Circumventing the installed built-in limitations on Android devices.
Sideloading
Downloading unofficial apps.
Carrier unlocking
Uncoupling a phone from a specific wireless provider.
Short message service (SMS)
Text messages of a maximum of 160 characters.
Multimedia Messaging Service (MMS)
Text messages in which pictures, video, or audio can be included.
Storage segmentation
Separating business data from personal data on a mobile device.
Containerization
Separating storage into separate business and personal “containers”.
Mobile device management (MDM)
Allows a mobile device to be managed remotely by an organization and involves a server component, which sends out management commands to the mobile devices, and a client component, which runs on the mobile device to receive and implement the management commands
Mobile application management (MAM)
He tools and services responsible for distributing and controlling access to apps.
Mobile Content Management (MCM)
Tools used to support the creation and subsequent editing and modification of digital content by multiple employees.
Application whitelisting
Ensures that only preapproved apps can run on the device.
Geofencing
Using the mobile device’s GPS to define geographical boundaries where an app can be used.
Embedded system
Computer hardware and software contained within a larger system that is designed for a specific function.
Industrial control systems (ICS)
Systems that collect, monitor, and process real-time data to control machines locally or at remote sites.
Supervisory control and data acquisition (SCADA)
A system that controls multiple industrial control systems (ICS)
System on a chip (SoC)
A single microprocessor chip on which all the necessary hardware components are contained.
Real-time operating system (RTOS)
An operating system that is specifically designed for a system on a chip (SoC) in an embedded system.
Internet of things (IoT)
Connecting any device to the internet for the purpose of sending and receiving data to be acted upon.