Security Administration (Ch. 11) Flashcards
Involves sending unsolicited messages to Bluetooth devices when they are in range.
bluejacking
Attack that involves getting data from a Bluetooth device.
bluesnarfing
BYOD
Bring Your Own Device.
COPE
Company-Owned and -Provided Equipment.
CYOD
Choose Your Own Device.
A rogue wireless access point that mimics the SSID of a legitimate access point.
evil twin
Global system for mobile communications. This is commonly known as 2G
GSM
This is a standard for wireless communication of
high-speed data for mobile devices. It is what is commonly called 4G.
(LTE) Long-Term Evolution
This is a 3G standard based on GSM. It is essentially an improvement over GSM.
(UMTS) Universal Mobile Telecommunications Systems