Lesson 13 - Implementing Secure Mobile Solutions Flashcards
(42 cards)
Methods of provisioning mobile devices to users, such as BYOD and CYOD.
Deployment Model
Security framework and tools to facilitate use of personally-owned devices to access corporate networks and data.
Bring Your Own Device (BYOD)
Enterprise mobile device provisioning model where the device is the property of the organization and personal use is prohibited.
Corporate Owned, Business Only (COBO)
Enterprise mobile device provisioning model where the device remains the property of the organization, but certain personal use, such as private email, social networking, and web browsing, is permitted.
Corporate Owned, Personally Enabled (COPE)
Enterprise mobile device provisioning model where employees are offered a selection of corporate devices for work and, optionally, private use.
Choose Your Own Device (CYOD)
The process and supporting technologies for tracking, controlling, and securing the organization’s mobile infrastructure.
Mobile Device Management (MDM)
Enterprise management function that enables control over apps and storage for mobile devices and other endpoints.
Mobile Application Management (MAM)
Enterprise software for controlling device settings, apps, and corporate data storage on all types of fixed, mobile, and IoT computing devices.
Unified Endpoint Management (UEM)
Since version 4.3, Android has been based on Security-Enhanced Linux, enabling granular permissions for apps, container isolation, and storage segmentation.
SEAndroid
An access control scheme that verifies an object’s identity based on various environmental factors, like time, location, and behavior.
Context-Aware Authentication
Software that allows deletion of data and settings on a mobile device to be initiated from a remote server.
remote wipe
a small form factor hardware security module designed to store cryptographic keys securely. This allows the cryptographic material to be used with different devices, such as a laptop and smartphone.
MicroSD HSM
a means of determining the device’s latitude and longitude based on information received from satellites via a GPS sensor.
Means of determining a receiver’s position on the Earth based on information received from GPS satellites. The receiver must have line-of-sight to the GPS satellites.
Global Positioning System (GPS)
A means of deriving a device’s location when indoors, by triangulating its proximity to radio sources such as Bluetooth beacons or WAPs.
Indoor Positioning System (IPS)
The practice of creating a virtual boundary based on real-world geography.
Geofencing
The process of adding geographical identification metadata, such as the latitude and longitude where the device was located at the time, to media such as photographs, SMS messages, video, and so on.
GPS Tagging
Installing an app to a mobile device without using an app store.
Sideloading
A type of virtualization applied by a host operating system to provision an isolated execution environment for an application.
Containerization
this term is associated with Android devices. Some vendors provide authorized mechanisms for users to access the root account on their device. For some devices it is necessary to exploit a vulnerability or use custom firmware. Custom firmware is essentially a new Android OS image applied to the device. This can also be referred to as a custom ROM, after the term for the read only memory chips that used to hold firmware.
Rooting
iOS is more restrictive than Android so the term “jailbreaking” became popular for exploits that enabled the user to obtain root privileges, sideload apps, change or add carriers, and customize the interface. iOS jailbreaking is accomplished by booting the device with a patched kernel. For most exploits, this can only be done when the device is attached to a computer when it boots (tethered jailbreak).
Jailbreaking
For either iOS or Android, this means removing the restrictions that lock a device to a single carrier.
Carrier Unlocking
Close-range networking (usually based on Bluetooth or NFC) allowing communications between personal devices, such as smartphones, laptops, and printers/peripheral devices.
Personal Area Networks (PANs)
A type of wireless network where connected devices communicate directly with each other instead of over an established medium.
Adhoc Network
Using the cellular data plan of a mobile device to provide Internet access to a laptop or PC. The PC can be tethered to the mobile by USB, Bluetooth, or Wi-Fi (a mobile hotspot).
Hotspot