Mobile, Embedded, and Specialized Device Security Flashcards
What are the 2 LEDs under wearable?
Green and Red
What does the green LED do on the wearable?
blood absorbs to determine heart rate
Photoplethysmography(PPG)
accurate and battery-consuming
What does the red LED do on the wearable?
blood reflects every so often (10min) to measure resting heart rate
saves battery
What’s a feature phone?
Early cell phone
limited features; usually one is highlighted
What is a PDA?
Personal Digital Assistant
handheld to replace paper systems
What is the difference between a notebook computer and a subnotebook computer?
A notebook computer is smaller than a laptop usually enough to fit in a briefcase while a subnotebook computer is a hybrid; it can be a tablet or computer
What type of connectivity method is divided into cells?
Cellular
How much does a cellular hexagon cell measure?
10 square miles
What is in the middle of a cellular cell?
Transmitter
BYOD
Bring Your Own Device
What is BYOD deployment?
Employees buy own devices for work
This saves cost
small companies and temp staff
COPE
Corporate Owned, Personally Enabled
What is COPE deployment?
Employees choose from pre-approved devices
paid by company
employees can use for personal use
CYOD
Choose Your Own Device
What is CYOD deployment?
Employees choose from pre-approved list
employee pays or rents device
usually offer a fixed fee to carrier
Segmentation Storage
Separates personal data to company data
containerization
What is VDI?
Remotely launch their desktop environment from home/mobile
Centrally protected and managed
What is Mobile Device Management?
Mobile devices are remotely managed to secure, enforce, and configure.
Device focused
What is MAM?
Application management to distribute or control access
Application focused
What is MCM?
supports creation and subsequent editing and modification.
Edit history, version control, indexing, and searching
What is UEM?
All MDM, MAM, MCM to a single interface
FPGA
Field-Programmable Gate Array
What is an FPGA?
Hardware chip or IC board
No pre-programmed functions
Allows multi-user access
What is an FPGA vulnerability?
Allowing multi-users opens to side-channel attacks that use its energy consumption to break encryption