Mobile Device Flashcards
This system can deny network access to non compliant device
Network Access Control
Refers to removing all software restrictions from an Apple device. Users can install software from any third party source
Jailbreaking
It is the process of copying an application package in the Application Packet Kit (APK) format to the device and activating it. It allow apps from Unknown Sources, which can significantly weaken security.
Sideloading
It is the highest level of wireless security and relies on the Advanced Encryption Standards for its encryption algorithm AKA AES.
Wifi Protected Access 2 ( WPA2)
SMS link bait
Pretexting scam
This allows two phones to utilize the same service andallows an attacker to gain access to the phones data.
SIM Cloning
Unsolicited Message to your bluetooth
Bluejacking
Unatuhorized access of information from a wireless device over bluetooth
Bluesnarfing
Smartphone and many tablets include the ability to connect to a cellular network such as 3G, long term evolution (LTE ) 4G or 4G LTE. It is dependent to your cellular provider
Cellular
Mobile device almost always have a wireless network interface that you can connect to a wireless network. Wireless network require you to enter or select the SSID and enter preshared key or password to access net work
Wi-Fi
It is a wireless protocol commonly used with a personal area network
Bluetooth
It is commonly used as a payment gateway allowing you to make payments simply by waving your phone in front of an nfc reader.
NFC Near Field Communication
A propriety wireless protocol used by some mobile device. Many sports and fitness sensors collect data to a mobile device application
ANT
It is a line of sight wireless technology. It is use as a universal remote for their equipment
Infrared
Mobile devices can typically be connected to a desktop PC or laptop via usb cable
USB Universal serial bus
Adds geographical Information to file such as pictures when posting them to social media websites
GPS tagging
A form of wireless communication that incorporates to use a electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum can you play identify an object animal or person
RFID Radio Frequency Idenification
In Wi-Fi networking a wireless bridge let users wirelessly connect two or more locations together. Dispersion able to use her to share an Internet connection between two or more locations to Share files and other types of their across the network
Point to Point
It is a communication which is accomplished via distinct type of one to many connection providing multiple as of single location to multiplication
Point to multi pont
MDM tools Can restrict what applications can run on mobile devices. They often use application whitelist to control the applications and prevent unapprove applications from being installed.
Application management
Tools to help ensure that devices meet minimum security requirements. They can monitor devices enforce security policies and block network access If device do not need this requirements
Mobile Device Management
Mobile device are owned by the organization but employees can use them for personal reasons
COPE corporate-owned personally enabled
Allows employess to connect their mobile devices to the organization’s network
BYOD Bring your own device
Cable allows you to connect mobile device
Universal serial bus on the go USB OTG
Allows one mobile device to share its Internet connection with other devices.
Tethering
Uses global positioning system to identify device location
Geolocation
Uses GPS to create a virtual fence or geographic boundary.
Geofencing
The organization purchases devices And issues them to employees
Corporate Owned
After creating segmented storage spaces, it was important to enusre that appropriate content is stored there. An MDM system can ensure that all content retrieved organization source is stored in an encrypted segment. It forces the user to authenticate again when accessing data within this encrypted segment
Content management
MDM System typically support password policies similar to the password policies use desktop system.
Passwords and PINs
It is one of the authentication factors ( something you are) for mobile device authentication.
Biometrics
It sends a remote signal to the device to wipe or erase all data. This also delete any cached data such as cached online banking passwords And provides a complete sanitation of device by removing all valuable data
Remote wipe
Protects against loss of confidentiality On multiple platforms including workstations servers mobile devices and data transmissions. Also provide device security application security and data security.
Full device Encryption
Creating a clear separation between personal and company data on a single device
Storage segmentation
Can prevent application from being installed on the device
MDM
Uses more elements to authenticate a user and mobile device. It can include the users identity geolocation,verification that the device is within a geofence, Time of day and type of device to help prevent unauthorize users from accessing apps or data
Context aware authentication
Can also be implemented in mobile devices by running an application in a container, it isolates the application including off its data. It’s possible to encrypt a container to WhatsApp it without encrypting the entire device.
Containerization
To remind user of security settings or to let them know if their device is complying policy requirements
Push Notification services
It is a Standard that allows devices to connect without a wireless access point or wireless router this is similar to a wireless ad hoc network
Wi-Fi direct
It is software that secures and enables IT control
over enterprise applications on end users’ corporate and personal smartphones and
tablets. This software allows IT administrators to apply and enforce corporate policies on
mobile apps and limit the sharing of corporate data among apps.
Mobile application management (MAM)