Module 5 Flashcards
What are examples of different types of mobile devices?
- Tablets
- Smartphones
- Wearables
- Portable Computers (laptops)
What are the 4 different methods for connecting mobile devices to networks?
- Cellular: A communications network in which the coverage area is divided into hexagon-shaped cells. (transmitter/cell tower transmits the signals)
- Wi-Fi
- Infrared: Light that is next to visible light on the light spectrum and was once used for data communications. (rarely used due to slowness)
- USB connections: A port on mobile devices used for data transfer.
What are the 5 different enterprise deployment models regarding mobile devices for employees?
- Bring your own Deice (BYOD): Employees use their own device
- Corporate owned, personally enabled (COPE): Employees choose from a selection of company-approved devices
- Choose your own device (CYOD): Employees choose from limited selection of approved devices but pay the upfront cost of device while business owns the contract
- Virtual desktop infrastructure (VDI): Stores sensitive applications and data on a remote server accessed through a smartphone
- Corporate Owned: Device is purchased and owned by the enterprise
What are the 3 main security risks associated with mobile devices?
- Mobile device vulnerabilities: physical security (theft), limited updates, location tracking (GPS, GPS Tagging)
- Connection Vulnerabilities: Tethering, USB On-the-Go, Malicious USB cable, Hotspots
- Accessing Untrusted Content: via jailbreaking or rooting, third-party app store, custom firmware, SMS MMS and RCS, QR codes
What are the 4 different configurations that should be considered when setting up a mobile device for use?
- Use strong authentication: Passcode, PIN, Screen lock
- Managing encryption: full disk encryption (on mobile devices)
- Segmenting storage: Storage segmentation (separating business from personal data), containerization (storage is separated into containers)
- enabling loss or theft services: (alarm, last known location, locate, remote lockout, thief picture), remote wipe
What are 4 different support tools that can facilitate the management of mobile devices in an enterprise?
- Mobile Device Management (MDM): Tools that allow a device to be managed remotely by an organization.
- Mobile Application Management (MAM): Tools that are used for distributing and controlling access to apps on mobile devices.
- Mobile Content Management (MCM): A system that is tuned to provide content management to mobile devices used by employees in an enterprise.
- Unified Endpoint Management (UEM): A group or class of software tools has a single management interface for mobile devices as well as computer devices.
What is an Embedded system?
Computer hardware and software contained within a larger system that is designed for a specific function.
What are two different hardware components that can be used to create your own specialized devices?
- Rasberry Pi: A low-cost credit-card-sized computer motherboard.
- Arduino Board: A controller for other devices (not as powerful)
What is a field-programmable gate array (FPGA)?
- A hardware integrated circuit (IC) that can be programmed by the user.
- Used in Rasberry Pi and Arduino for customizability
What is system on a chip (SoC)?
- A single microprocessor chip on which all the necessary hardware components are contained.
- Often uses real-time operating system (RTOS) (os designed specifically for SoC that processes high amount of data at once for quick decision making)
What are some examples of a specialized systems?
-
smart meters: Digital meters that measure the amount of utilities consumed. Gives automatic meter readings as opposed to an analog meter
- Other examples: Medical systems, aircraft, vehicles
- heating, ventilation, and air conditioning (HVAC): Environmental systems that provide and regulate heating and cooling.
- *multifunctional printer (MFP):** A device that combines the functions of a printer, copier, scanner, and fax machine.
- Unmanned aerial vehicle (UAV)/Drones
What are Industrial control systems (ICSs)? What are ICSs managed by?
- Systems that control locally or at remote locations by collecting, monitoring, and processing real-time data to control machines.
- Managed by a supervisory control and data acquisition (SCADA), which controls the ICSs
What is voice over IP (VoIP)?
A technology that uses a data-based IP network to add digital voice clients and new voice applications onto the IP network.
What is the Internet of Things (IoT)?
- Connecting any device to the Internet for the purpose of sending and receiving data to be acted upon.
- Devices that wouldn’t be considered computing devices, such as wearables, refrigerator, etc