Mobile Security Flashcards

1
Q

What are some security risks that mobile devices face and would you remedy them?

A

Mobile devices face several security risks which include:
1. Malware and Spyware: These are malicious software designed to steal user data, track user activity, or compromise device security. You can
avoid malware by using antivirus software and updating your operating system. For spyware, install anti-spyware software, and restrict application permissions
2. Premium SMS billing: This is when applications without a user’s knowledge, sign them up for premium SMS services which they get charged for, you can avoid this
by restricting application permission, and billing privileges
3. SMS and Email Phishing: This is when malicious individuals with the help of SMS or e-mails try to trick users into revealing sensitive information, you can avoid
this by double checking sender identities, and being careful with unsolicited emails or SMS
4. Malicious Websites: Malicious websites can install malware into your device without you knowing, to avoid this, stay away from unsecured websites, and use browsers
with safe mode browsing
5. Physical threats: This is when an individual can have access to your device if unattended, to avoid this, never leave your device unattended, and ensure you have
strong password protection on your device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are three ways to track the location of mobile devices?

A

Cell tower triangulation, the device’s built-in GPS, or the use of spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between mobile device testing and mobile application testing?

A

With mobile device testing the software and hardware of a device are tested including its
features, performance, sensors, etc. to ensure that it meets any required standards, with mobile application testing the functionality, usability, and compatibility
of an application are testing including factors, like the UI, user interactions, data handling, etc, this is to ensure that the application works as intended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name the actions that can take place in Mobile computing OS.

A

Acronym MUDS:
1. Multity tasking and Task switching
2. User Interactions
3. Device Management
4. Security and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly