Mobile Device Security Flashcards

(59 cards)

1
Q

Near field communication (NFC)

A

Employment of electromagnetic induction to enable communication between devices within 10cm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Satellite communications (SATCOM)

A

Artificial geostationary satellite that provides services across the globe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cellular Communication

A

Based on a single network tower that serves devices located within a certain radius.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ANT

A

A wireless sensor protocol that enables communication between sensors and their controllers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Universal serial bus (USB)

A

Enabled wired communication between devices that can be used for power supply, and serial data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Global positioning system (GPS)

A

A system that determines the precise location of something on earth through a series of satellites, tracking stations, and recievers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Infrared (IR)

A

A wireless technology for transmitting data between two devices in the digital form within 5m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wi-Fi

A

A common wireless technology used in homes and office buildings to connect local devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bluetooth

A

A short range high speed low power wireless technology that enables communication between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

5G cellular Communication

A

A broadband cellular network that operates at low latency, high bandwidth, and provides high speed downloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Point to point (P2P) connection

A

Enables secure communication between two devices without encryption, through a fixed path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Point to multipoint connection

A

Allows one to many connections by providing multiple paths from a single location to many others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Radio frequency identification (RFID)

A

A form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mobile app management

A

Used by IT admins and others to secure and control organizational data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mobile security management

A

The actions and precautionary steps for securing the organizations data and mobile devices used by it’s members

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Enterprise Mobility Management

A

Used to secure data in employees personal devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Remote wipe

A

Allows admins to remotely remove data from a mobile device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Screen lock

A

Used to prevent unauthorized access to the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Passwords/pins

A

Form of authentication on electric devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Geolocation

A

Can identify the real world location of devices through the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Geofencing

A

Virtual fence that interferes with mobile users when they cross an arbitrary line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Full device encription

A

Can encrypt all data stored within a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Containerization

A

The application of encryption software to segment a device between personal data and the encrypted organizational data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BYOD

A

Bring your own device

25
COPE
Company owned personally enabled
26
COBO
Company owned business only
27
CYOD
Choose your own device
28
What are the benefits of BYOD
Low cost, less employee aggravation
29
What are the downsides of BYOD
Difficult to maintain security, comparability issues which make it hard to scale
30
What must be done to successfully implement BYOD
``` Define the specs Decide how the data will be managed Policies How security will be implemented How support will be issued ```
31
What are the benefits of CYOD
Streamlines options Able to control the devices without overly disturbing employees Devices meet any spec requirements Lower cost than COPE
32
What are the disadvantages of CYOD
Employees must seek out repairs and replacement Must use updates though the organization Slow deployment timeframe
33
What must be done to implement a CYOD policy?
Define a set of devices A set of deletion policies Define the security that must be implemented Define how support will be obtained by user
34
What are the benefits to the COPE policy
Greater control Org retains device ownership Prevents multiple devices from being required
35
What are some of the downsides of COPE
Org will be required to purchase the device Monitoring policies will need to be put in place Business will be required to update all devices Slow deployment time
36
What will be needed to deploy a COPE policy
The purchasing of devices and required software Allow employees to work with the device to develop a tech portfolio Develop policies Deploy security and support
37
What are the benefits of COBO
Prevents data loss | The org posseses full authority
38
What are the downsides of COBO
High purchase cost | Requires employees to carry multiple devices
39
What must be done to implement a COBO policy?
Prohibit personal use on business devices Allow employees to get used to the device Develop policies Deploy security and support on COBO devices
40
Enterprise Mobile Device Security risks
Weak security systems Insufficient config allowance Can be taken outside the bounds of physical security
41
What challenges face mobile devices when it comes to security?
Harder to track and secure Can be easily mismanaged Have to ensure all devices are up to date
42
Risks for all mobile policies
The sharing of confidential data Data leakage and endpoint security Supporting different devices/ OS's Mixing of personal and private data The ability to bypass policy issues Disgruntled employees
43
Sec prof guidelines for Mobile policies
Ensure multi-layer protection of systems Educate the employees Clarify which apps and data are owned by who Use of encrypted channels for sensitive data Clarify any bans Control access Ensure employees sign off on the policies
44
Employee guidelines for Mobile policies
Use encryption to store all sensitive data Maintain a separation of org and personal data Register devices that contain any org data Update the OS regularly Use anti-virus and DLP solutions Set a strong passcode
45
Mobile device Management (MDM)
Used to deploy, manage, and monitor org owned devices
46
Features of MDM solutions
Security management Device configuration Device inventory and tracking Over the air distribution Policy management Password enforcement Data encryption enforcement Network integration Remote data wipe Blacklisting/ whitelisting of apps and devices
47
Mobile application management (MAM)
Enables network defenders to secure, manage, and distribute applications on employee mobile devices
48
What are the features of an MAM solution
Device activation Enrollment in provisioning capabilities Remote wipe and other device level functionality Minimal admin intervention
49
Mobile Content Management (MCM) or Mobile Information Management (MIM)
Provides secure access to corporate data Enables secure sharing
50
Mobile Threat Defence (MTD)
As to secure mobile devices against malicious threats, network attacks, and device vulnerabilities
51
Mobile Email Management (MEM)
Pre-config emails on devices remotely, ensures that only approved apps and devices can access the emails, prevents unauthorized access to emails, pre installs the email client
52
Unified endpoint management (UEM)
Ensures remote provisioning, managing, controlling, and securing internet based solutions Tracking device usage Remote, Manuel, or auto pushing of updates Supporting employee owned devices Threat detection and mitigation
53
Enterprise Mobility Management (EMM)
A comprehensive solution responsible for MDM, MAM, MTM, MCM, and MEM. Secures and manages devices across multiple OSs.
54
Mobile app security best practices
Ensures that the app does not save passwords Avoid the use of the query string while handling sensitive data Use code obfuscation and encryption Implement two-factor authentication Use SSL/TLS to send data over secure channels Avoid caching app data Perform validation checks on input data Implement secure session management
55
Mobile data security best practices
Encrypt the data stored on the device Enable over the air encryption Backup the mobile data periodically Do not store extremely sensitive data on the device Do not store passwords or pins as contacts Use private data centers to store data
56
Mobile network security guidelines
Disable interfaces like Bluetooth, IR, and WiFi when not in use Set Bluetooth enabled devices to non discoverable Avoid connecting to unknown WiFi Config web accounts to use secure connections
57
General guidelines for Mobile platform security
Avoid excessive installation of apps Avoid auto uploading photos Maintain configuration control and management Install from trusted sources Wipe or delete data before disposing a device Disable GPS unless required
58
Kaspersky
Internet security for Android uses machine learning to combat new threats
59
Avira
Mobile security for iOS devices provides web protection, identity safeguarding, and identifies phishing websites.