Lesson 13 Secure Mobile Devices Flashcards
MDM
Mobile Device Manager
SW used to configure, protect and remote wipe phones that are enrolled
sets device policies for Authentication, feature use, and connectivity
Allows for device resets and remote wipes
EMM
Enterprise Mobility Management
Method to manage mobile devices
VDI
Virtual Desktop Infrastructure
Used for thin clients who connect to a VM host
Centralizes managements
promotes security
MAM
Mobile Application Management
function of the MDM
Allows a Admins to whitelist or blacklist which apps can be installed
configures an enterprise-managed container or workspace
MEM
Mobile Email Management
part of ERP
Geofencing
ability to accept or reject access to a network based on location of the device
also used to send alerts to a device when the device enters specific area
utilizes geolocation
Geotagging
the recording of the GPS location in the meta data of a file when it is created on a mobile device
Containerization
Used on mobile devices by an employer to mange and maintain the portion of the device that can interface with the corporate network
isolates corporate apps from the rest of the device
enforces storage segmentation of the device
assists in content management and data loss prevention (DLP)
Allows for personal use on the device with out worry of breaching security policies
COPE
Corporate Owned, Personally Enabled
allows personal use on a corporate owned phone
BYOD
Bring Your Own Device
Device is owned by employee
employee must agree to the terms of use
difficult from a security standpoint
COBO
Corporate Owned Business Only
CYOD
Choose Your Own Device
employee is given a choice of device from a list
but still owned by the company
otherwise same as COPE
EMM
Enterprise Mobility Management
SW which applies security policies for mobile devices and apps in the enterprise
2 main functions
Mobile device management (MDM)
Mobile application management (MAM)
UEM
Unified Endpoint Management
visibility across many devices, PC, laptop, smartphone, tablet, IoT devices
extends the concept of network access control (NAC) solutions
logs the use on network
determines access to network
determines ability of device to use of apps, corporate data, and device built-in functions
Rooting
A privilege escalation allowing Android users to gain access to the root account on their device