Mobile Device Security Flashcards
Near field communication (NFC)
Employment of electromagnetic induction to enable communication between devices within 10cm
Satellite communications (SATCOM)
Artificial geostationary satellite that provides services across the globe
Cellular Communication
Based on a single network tower that serves devices located within a certain radius.
ANT
A wireless sensor protocol that enables communication between sensors and their controllers
Universal serial bus (USB)
Enabled wired communication between devices that can be used for power supply, and serial data transmission.
Global positioning system (GPS)
A system that determines the precise location of something on earth through a series of satellites, tracking stations, and recievers.
Infrared (IR)
A wireless technology for transmitting data between two devices in the digital form within 5m
Wi-Fi
A common wireless technology used in homes and office buildings to connect local devices.
Bluetooth
A short range high speed low power wireless technology that enables communication between devices
5G cellular Communication
A broadband cellular network that operates at low latency, high bandwidth, and provides high speed downloads
Point to point (P2P) connection
Enables secure communication between two devices without encryption, through a fixed path.
Point to multipoint connection
Allows one to many connections by providing multiple paths from a single location to many others
Radio frequency identification (RFID)
A form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify something.
Mobile app management
Used by IT admins and others to secure and control organizational data.
Mobile security management
The actions and precautionary steps for securing the organizations data and mobile devices used by it’s members
Enterprise Mobility Management
Used to secure data in employees personal devices
Remote wipe
Allows admins to remotely remove data from a mobile device
Screen lock
Used to prevent unauthorized access to the device
Passwords/pins
Form of authentication on electric devices
Geolocation
Can identify the real world location of devices through the internet
Geofencing
Virtual fence that interferes with mobile users when they cross an arbitrary line
Full device encription
Can encrypt all data stored within a device
Containerization
The application of encryption software to segment a device between personal data and the encrypted organizational data.