Section 17 OBJ 1.4: Mobile Applicatons Flashcards
Mobile Application
Used to provide different features and functionality to a mobile device
Android
Offers an open-source code base for mobile devices.
Sponsored and developed by Google
iOS
Closed source code
Developed by Apple for use on iPhones and iPads
Open-Source
The software and original source code are available to download, modify, and redistribute
Closed-Source Software
Proprietary software that is licensed under the exclusive legal rights of the copyright holder
Microsoft 365
Provides the ability to have office productivity software and storage in the cloud
Mobile Device Synchronization/Sync
Act of copying data back and forth from devices
Contact
Record inside of an address book that contains fields of names, emails, addresses, phone numbers, etc
vCard
Standard format and is widely supported by most address books and software applications
Calendar Information
Any record with fields for appointments or tasks with their corresponding subject, date, location, and attendees
POP3
oldest mail format and does not support synchronization across devices
IMAP and Exchange
both can manage the state of email (read, unread, etc)
Cloud-based Synchronization
Provides the access tot he cloud from all devices and becomes the central repository for all data
Synchronization requires large amounts of data to be transferred
3 big ones:
Microsoft 365
Google Workspace
iCloud
Computer Synchronization
Synchronizes directly to the desktop or laptop using a USB or Bluetooth connection
Automobile
Synchronize to a car for maps and calling
Enterprise Mobility Management (EMM)
A class of software designed to apply security policies for use on mobile devices
Mobile Device Management (MDM)
Sets device level policies for authentication, feature use, and connectivity
Mobile Application Management (MAM)
Sets policies for apps that can process corporate data and prevents data transfer to personal apps
Popular with organizations that allow employees to access corporate data on their personal devices
Data Loss Prevention (DLP)
Detects when data is being taken from a device, ensuring it’s the only being used in the proper way
Multifactor Authentication
The use of multiple factors to authenticate a user
Five authentication factors
Knowledge Factor: something you know
Possession Factor: something you have
Inherence Factor: something you are
Behavior Factor: something you do
Location Factor: somewhere you are
Coarse Positioning
Oldest method of positioning using mobile phones
Global Positioning System (GPS)
Space-based radio navigation system that consists of satellites and networks of ground stations
Indoor Positioning System (IPS)
Has the ability to figure out a device’s location even if being used indoors
Geo-Tracking
Tracking of a location over a given amount of time