Mobile Device Security Flashcards
Describe these mobile use policies:
1) Bring your own device (BYOD)
2) Choose your own device (CYOD)
3) Corporate Owned, Personally Enabled (COPE)
4) Company Owned, Business Only (COBO)
1) When employees bring their personal devices for accessing organizational resources.
2) When employees can select their own devices, approved by the companyy, to access organizational resources.
3) Allows employees to use and manage the devices purchased by the organization.
4) When devices purchased by the organization are used the business purposes only.
Describe the follwoing Mobile Device Management terms:
1) Geolocation
2) Geofencing
3) Full Device Encryption
4) Containerization
5) OTA Updates
1) Provide the real-world geographical location when a device is connected to the Internet.
2) A virtual fence that interacts with users at a specific location once they cross the fence.
3) Encrypts all medium within a mobile device.
4) When personal and organizational data is segregated.
5) New method of delivering udpates.
Describe these term:
1) NFC
2) Satcom
3) Cellular communication
1) Enables communication between devices up to 10cm.
2) An artificial satellite that provides services across the globe.
3) single network tower that provides services within a certain radius.
Describe these terms:
1) ANT
2) IR
1) A wireless sensor protocol that enables communication between sensors and their controllers.
2) Transfers data between two devices up to 5m.
Describe these Mobile Devie Management (MDM) components:
1) Mobile Application Management
2) Mobile Content Management
3) Context-Aware Authentication
1) Controls as secures organizational data. Eg; remote wipe, remote activation/deactivation.
2) Safeguards the data on mobile devices.
3) uses geolocation, identity, and behaviour for data security decisions.
Describe these Mobile Devie Management (MDM) components:
1) Mobile Enterprise Management
2) Mobile Security Management
1) Consists of tools and techniques to secure data on BYOD and organizational devices.
2) Consits of steps and procedures to secure data on mobile devices.