Comptia+ Chapter 6 Flashcards
Cellular
A communications network in which the coverage area is divided into hexagon-shaped cells
Bring your own device(BYOD)
Allows users to use their own personal mobile devices for business purposes
Corporate owned, personally enabled (COPE)
Employees choose from a selection of company approved devices
Choose your own device (CYOD)
Employees choose from a limited selection of approved devices, but the employees pay the upfront cost of the device while the business owns the contract.
Jailbreaking
Circumventing the installed built-in limitations on Apple iOS devices
Sideloading
Downloading unofficial and unapproved apps
Hardening mobile devices
Steps that can be taken to make mobile devices more resilient to attacks
Embedded system
Computer hardware and software contained within a larger system that is designed for a specific function
Real-time operating system (RTOS)
An operating system that is specifically designed for an SoC and an embedded system
High availability
An RTOS that is tuned to accommodate very high volumes of data that must be immediately processed for critical decision making. Also, making servers always accessible.
Hardening RTOS
Steps that can be taken to make a real-time operating system more resilient to attacks.
Industrial control systems (ICSs)
Systems that control locally or at remote locations by collecting, monitoring, and processing real-time data to control machines.
Supervisory control and data acquisition (SCADA)
A system that controls multiple industrial control systems (ICS)
Internet of Things (IoT)
Connecting any device to the internet for the purpose of sending and receiving data to be acted upon.
Power
A security constraint in which a system lacks sufficient power to perform strong security measures
Compute
A security constraint in which a device’s small size results in low processing capabilities to incorporate comprehensive security measures.
Inability to patch
A security constraint in which the capacity is absent for updating to address exposed security vulnerabilities.
Patch availability
A security constraint in which manufacturers do not produce patches for devices
Cost
A security constraint in which making products as inexpensive as possible results in leaving out security protections. Also, a disadvantage of automation is that it is more expensive.
Ease of recovery
A security constraint in which a compromise sensor may have difficulty recovering to its normal state following an attack.
Responsiveness
A security constraint in which IoT devices that require immediate responsiveness to inputs are crippled by adding security features.
Scalability
A security constraint in which increasing the size and scope of an IoT device introduces new vulnerabilities.
Ease of deployment
A security constraint in which an accelerated rollout of devices at a faster pace prevents them from being secured.
Risk transference
A security constraint in which shifting risk and responsibility from one area of oversight to another results in security vulnerabilities.