Lecture 7b Flashcards

(67 cards)

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some types of mobile devices?

A

Tablet computers smartphones wearables portable computers web based computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a tablet?

A

A portable computing device that generally lacks a built in keyboard or mouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What distinguishes a smartphone from a feature phone?

A

It has an operating system that allows it to run apps and access the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are wearables?

A

Devices that can be worn by the user instead of carried

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the most common wearable device?

A

Smartwatch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are portable computers?

A

Smaller self contained devices resembling standard desktop computers running on battery power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a web based computer?

A

A device with a limited version of an OS and a web browser with integrated media player

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some core features of mobile devices?

A

Small form factor mobile operating system wireless data network interface wireless cellular connection local nonremovable data storage data synchronization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some additional features of mobile devices?

A

GPS microphone digital camera app stores Bluetooth NFC removable storage media device as removable storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is cellular connectivity?

A

Coverage area divided into cells transmitters connected through mobile telecommunications switching office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Wi-Fi?

A

Wireless local area network designed to replace or supplement wired LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What communication method uses light instead of radio frequency?

A

Infrared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is infrared rarely used today?

A

Due to slow speed and other limitations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the types of USB connections on mobile devices?

A

Standard size mini and micro connectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is BYOD?

A

Bring your own device employees use personal mobile devices for business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What responsibilities do employees have in BYOD?

A

Full responsibility for choosing and supporting the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is COPE?

A

Corporate owned personally enabled company supplies device but employee can use it personally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does CYOD mean?

A

Choose your own device employees choose from approved devices pay upfront but business owns contract

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is virtual desktop infrastructure VDI?

A

Stores sensitive apps and data on remote server accessed through smartphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a benefit of VDI for enterprises?

A

Central protection and management of apps and data on servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does corporate owned device mean?

A

Device purchased and owned by enterprise used only for company business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are some benefits of BYOD COPE and CYOD models?

A

Management flexibility cost savings increased employee performance simplified IT infrastructure reduced internal service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are user benefits of BYOD COPE CYOD?

A

Choice of device choice of carrier convenience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are some mobile device vulnerabilities?
Physical security limited updates location tracking unauthorized recording
26
What is physical security risk for mobile devices?
Devices frequently lost or stolen
27
How are security patches distributed for mobile OS?
Firmware over the air OTA updates
28
What is location tracking risk?
Devices with GPS can be targeted for physical attacks and GSP tagging adds geographical data to media
29
What is unauthorized recording risk?
Malware can spy and record conversations or videos without user knowledge
30
What is jailbreaking or rooting?
Circumventing installation limits to download apps from unofficial third party stores
31
How can untrusted content enter mobile devices?
Through SMS MMS RCS text messaging and malicious QR codes
32
What is tethering?
Sharing mobile internet connection with other devices via Bluetooth or Wi-Fi
33
What is the risk of tethering?
An unsecured device can infect tethered devices or corporate network
34
What is USB On the Go OTG?
Mobile device functions as host or peripheral for external media access
35
What risk does USB OTG pose?
Connecting infected flash drives can infect device or malware can be sent when connected to infected computer
36
What is a malicious USB cable?
A USB cable embedded with Wi-Fi controller to send malicious commands to device
37
What is the risk of malicious USB cables?
Device recognizes cable as human interface device giving attacker permissions to exploit system
38
What is a hotspot risk?
Attackers can eavesdrop on data transmissions on public wireless signals
39
What is a strong authentication method on mobile devices?
Passcode PIN fingerprint pattern screen lock
40
What does a screen lock do?
Prevents device access until correct passcode is entered
41
What is full disk encryption on mobile devices?
Encrypts all user data when device is locked
42
Why segment storage on mobile devices?
Separates business data from personal data to avoid privacy and legal concerns
43
What are some ways to reduce risk of theft or loss of mobile devices?
Keep device out of sight avoid distraction use both hands use less conspicuous headphone cords do not chase thief
44
What are some mobile device security features?
Alarm last known location locate remote lockout thief picture
45
What does the alarm feature do?
Generates alarm even if device is on mute
46
What does the last known location feature do?
Shows last device location on map if battery low
47
What does the locate feature do?
Pinpoints current device location via GPS on a map
48
What does remote lockout allow?
Remotely locks device and displays custom message on login screen
49
What does the thief picture feature do?
Takes picture of person entering wrong passcode three times and emails owner
50
What are Mobile Device Management MDM tools?
Tools to manage mobile devices remotely by an organisation
51
What is Mobile Application Management MAM?
Tools and services for distributing and controlling app access
52
What is Mobile Content Management MCM?
Supports creation editing and modification of digital content by employees
53
What is Unified Endpoint Management UEM?
Software tools with single interface for managing mobile and computer devices
54
What is an embedded system?
Computer hardware and software within larger system designed for specific function
55
What is a Raspberry Pi?
Low cost credit card sized computer motherboard used for many tasks including controlling specialised devices
56
What is a field programmable gate array FPGA?
Hardware chip programmed by user to carry out logical operations
57
What is a system on a chip SoC?
Single chip combining electronic circuits of computer components often running real time OS
58
What are smart meters?
Digital meters measuring utilities with advantages over analogue meters
59
What are industrial control systems ICS?
Systems collecting and processing real time data to control machines without human intervention
60
What is SCADA?
Supervisory control and data acquisition managing ICS
61
What is an unmanned aerial vehicle UAV?
Drone aircraft without human pilot used for surveillance deliveries and more
62
What is the Internet of Things IoT?
Connecting any device to the Internet to send receive data for action
63
What are body area networks BAN?
IoT devices network in close proximity cooperating for user benefit
64
What is Autonomous Body Sensor Network ABSN?
BAN with actuators providing immediate effects on human body
65
Why do embedded devices have security challenges?
Low power low compute limited network limited cryptography inability to patch weak authentication cost and weak defaults
66
What legislation addresses IoT security in the US?
Internet of Things Cybersecurity Improvement Act of 2019
67
What did California and Oregon do in 2020 about IoT?
Passed laws requiring reasonable security features for connected devices