Lesson 13 - Implementing Secure Mobile Solutions Flashcards
Methods of provisioning mobile devices to users, such as BYOD and CYOD.
Deployment Model
Security framework and tools to facilitate use of personally-owned devices to access corporate networks and data.
Bring Your Own Device (BYOD)
Enterprise mobile device provisioning model where the device is the property of the organization and personal use is prohibited.
Corporate Owned, Business Only (COBO)
Enterprise mobile device provisioning model where the device remains the property of the organization, but certain personal use, such as private email, social networking, and web browsing, is permitted.
Corporate Owned, Personally Enabled (COPE)
Enterprise mobile device provisioning model where employees are offered a selection of corporate devices for work and, optionally, private use.
Choose Your Own Device (CYOD)
The process and supporting technologies for tracking, controlling, and securing the organization’s mobile infrastructure.
Mobile Device Management (MDM)
Enterprise management function that enables control over apps and storage for mobile devices and other endpoints.
Mobile Application Management (MAM)
Enterprise software for controlling device settings, apps, and corporate data storage on all types of fixed, mobile, and IoT computing devices.
Unified Endpoint Management (UEM)
Since version 4.3, Android has been based on Security-Enhanced Linux, enabling granular permissions for apps, container isolation, and storage segmentation.
SEAndroid
An access control scheme that verifies an object’s identity based on various environmental factors, like time, location, and behavior.
Context-Aware Authentication
Software that allows deletion of data and settings on a mobile device to be initiated from a remote server.
remote wipe
a small form factor hardware security module designed to store cryptographic keys securely. This allows the cryptographic material to be used with different devices, such as a laptop and smartphone.
MicroSD HSM
a means of determining the device’s latitude and longitude based on information received from satellites via a GPS sensor.
Means of determining a receiver’s position on the Earth based on information received from GPS satellites. The receiver must have line-of-sight to the GPS satellites.
Global Positioning System (GPS)
A means of deriving a device’s location when indoors, by triangulating its proximity to radio sources such as Bluetooth beacons or WAPs.
Indoor Positioning System (IPS)
The practice of creating a virtual boundary based on real-world geography.
Geofencing
The process of adding geographical identification metadata, such as the latitude and longitude where the device was located at the time, to media such as photographs, SMS messages, video, and so on.
GPS Tagging