Chapter 21 terms and topics Flashcards
Policy that allows employees in an organization to use their personally owned devices for work-related activities.
BYOD
An employee provisioning model that allows employees to select a mobile device from a limited number of options.
CYOD
Deployment model, employees are supplied a mobile device that is chosen and paid for by the organization, but are given permission to use it for personal activities.
COPE
Company supplies employees with a mobile device that is restricted to company-only-use.
COBO
Security feature that allows a network admin or device owner to send a command that remotely deletes data from a computing device.
Remote Wiping
Security feature that locks up the device after a certain period of time of inactivity.
Remote Locking
The method of installing, updating, and managing the applications through a system.
Application Management
Original USB Speed is
480 Mbps
USB 3 speed is
5 Gbps
USB 3.1 speed is
10 Gbps
USB 3.2 speed is
20 Gbps
USB 4 speed is
40 Gbps
A marketing term for a collective set of commonly employed protection elements associated with mobile devices.
MDM
What six items should an MDM policy contain?
Device locking, Encryption, automatic device locking after inactivity period, remote lock, remote wipe, and device wipe after certain failed login attempts.
Power-conserving variant of PAN technology.
Bluetooth Smart
When a hacker intercepts, deletes, or modifies data that is transmitted between two devices.
Eavesdropping Attack.
A man-in-the-middle attack that occurs when a bad actor intercepts a secure network communication and fraudulently delays or resends it to misdirect the receiver into doing what the hacker wants.
Replay Attack
Four different types of attacks that can be performed against RFID systems, not including replay or eavesdropping attacks.
Attacks against Chips and Readers.
Communication channel attack between the device and the reader.
Attack against the reader and back-end system.
And Radio Frequencies attacks.
The use of GPS and/or RFID technology to create a virtual fence around a particular location.
Geofencing
Using GPS to track a device’s location.
Geolocation
Using geographic coordinates to media based on the location of a mobile device.
Geotagging
What are the advantages and disadvantages of Bluetooth 5?
Uses a different frequency spectrum, requiring new hardware and limiting backward compatibility, but it is designed for local networks of the future with low power consumption, inexpensive hardware and callable data rates versus range considerations.
What types of devices support sideloading?
Only Android mobile devices.