Domain 2.5 Given a scenario, deploy mobile devices securely. Flashcards
MDM
Mobile Device Management
Remote Wipe
Remotely wipe a mobile device (Birck the device)
Geofencing
Geofencing relies on GPS tracking. It only allows a device to work within a specific physical location.
Geolocation
The process or technique of identifying the geographical location of a person or device by information processed via the internet. Time, Date, Long/Lat of where a picture or video was taken.
Push Notification
the Notifying service pushes the notification out to your device
Pull Notification
Your device must go out and pull a notification in order to receive it.
Biometric
Something that makes you-you. Fingerprint, Face recognition, iris scanning, retina scanning.
Iris scanning
color part of your eye
retina
back of your eye
gait
how you walk
something you have
token, CAC, key
Context-Aware Authentication
takes into account the context in which the authentication attempt is being made. We all log in differently depending on location, time of day, what device they are logging in from.
Storage Segmentation
segmenting a mobile device’s storage to keep work data separate from personal or operating system data.
Full DEVICE encryption
Encrypting a phone
Side loading
When you get an app from someone else and install it on a jail broken/rooted device.
what device can you jailbreak?
iPhone
What device can your root?
Android
OTA update
Over the Air update. You do not have to plug in the phone
SMS
simple Text message
MMS
send a picture, or audio, or to multiple people
ad hoc
devices connecting to each other to get internet access through each other.
hot spot
an ad hoc network through a mobile device
GPS Tagging/Geotagging
adding geolocation data to the metadata to media
tethering
the process of literally attaching some cable from the mobile device to some immobile structure