Mobile Device Flashcards
This system can deny network access to non compliant device
Network Access Control
Refers to removing all software restrictions from an Apple device. Users can install software from any third party source
Jailbreaking
It is the process of copying an application package in the Application Packet Kit (APK) format to the device and activating it. It allow apps from Unknown Sources, which can significantly weaken security.
Sideloading
It is the highest level of wireless security and relies on the Advanced Encryption Standards for its encryption algorithm AKA AES.
Wifi Protected Access 2 ( WPA2)
SMS link bait
Pretexting scam
This allows two phones to utilize the same service andallows an attacker to gain access to the phones data.
SIM Cloning
Unsolicited Message to your bluetooth
Bluejacking
Unatuhorized access of information from a wireless device over bluetooth
Bluesnarfing
Smartphone and many tablets include the ability to connect to a cellular network such as 3G, long term evolution (LTE ) 4G or 4G LTE. It is dependent to your cellular provider
Cellular
Mobile device almost always have a wireless network interface that you can connect to a wireless network. Wireless network require you to enter or select the SSID and enter preshared key or password to access net work
Wi-Fi
It is a wireless protocol commonly used with a personal area network
Bluetooth
It is commonly used as a payment gateway allowing you to make payments simply by waving your phone in front of an nfc reader.
NFC Near Field Communication
A propriety wireless protocol used by some mobile device. Many sports and fitness sensors collect data to a mobile device application
ANT
It is a line of sight wireless technology. It is use as a universal remote for their equipment
Infrared
Mobile devices can typically be connected to a desktop PC or laptop via usb cable
USB Universal serial bus
Adds geographical Information to file such as pictures when posting them to social media websites
GPS tagging
A form of wireless communication that incorporates to use a electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum can you play identify an object animal or person
RFID Radio Frequency Idenification
In Wi-Fi networking a wireless bridge let users wirelessly connect two or more locations together. Dispersion able to use her to share an Internet connection between two or more locations to Share files and other types of their across the network
Point to Point
It is a communication which is accomplished via distinct type of one to many connection providing multiple as of single location to multiplication
Point to multi pont
MDM tools Can restrict what applications can run on mobile devices. They often use application whitelist to control the applications and prevent unapprove applications from being installed.
Application management
Tools to help ensure that devices meet minimum security requirements. They can monitor devices enforce security policies and block network access If device do not need this requirements
Mobile Device Management
Mobile device are owned by the organization but employees can use them for personal reasons
COPE corporate-owned personally enabled
Allows employess to connect their mobile devices to the organization’s network
BYOD Bring your own device
Cable allows you to connect mobile device
Universal serial bus on the go USB OTG