Term
|
Definition
Smaller self contained devices that are easily transported. |
|
|
Term
|
Definition
Portable computer that is smaller Than A Laptop |
|
|
Term
|
Definition
Portable computer that is smaller than a Notebook. |
|
|
Term
|
Definition
Limited use computer made to run web applications. |
|
|
Term
Mobile Device Connectivity Methods |
|
Definition
Cellular Satellite Infrared ANT USB Connections |
|
|
Term
|
Definition
A proprietary wireless network technology used primarily by sensors for communicating data. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Corporate Owned Personally Enabled |
|
|
Term
|
Definition
|
|
Term
|
Definition
Virtual Device Infrastructure
(It's like a VM on a Smartphone, but behind the scenes in the cloud.) |
|
|
Term
|
Definition
Device is purchased and owned by the enterprise for company use own. |
|
|
Term
Benefits of BYOD, COPE and CYOD |
|
Definition
Management Flexibility
less oversight
cost savings
increased performance
employee choice |
|
|
Term
What percent of all healthcare security breaches were to the loss or theft of a mobile device? |
|
Definition
|
|
Term
What percent of all laptop thefts occurred from unattended cars? |
|
Definition
|
|
Term
What percent of laptop thefts occurred in airports and hotels? |
|
Definition
|
|
Term
What percent of laptop thefts occurred in restaurants? |
|
Definition
|
|
Term
How do Users Update on Apple IOS? |
|
Definition
Itunes or over the air updates with their carrier. |
|
|
Term
Does Google create the hardware that Android runs on? |
|
Definition
|
|
Term
It is very difficult to update Mobile devices of what kind? |
|
Definition
|
|
Term
What features of mobile devices can provoke physical attacks? |
|
Definition
GPS
Unauthorized Recording |
|
|
Term
|
Definition
An unsecured mobile device may infect other tethered mobile devices or the corporate network. |
|
|
Term
|
Definition
On the Go
Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to the device. |
|
|
Term
Connecting to Public Networks |
|
Definition
Because these networks are beyond the control of the organization, attackers can eavesdrop on the data transmissions and view sensitive information |
|
|
Term
|
Definition
Matrix or two dimensional barcode which can be read by an imaging device. |
|
|
Term
How can attackers convince individuals to scan their QR Codes? |
|
Definition
By releasing advertisements that look official, but include a malicious QR code that claims to be from a reputable source. |
|
|
Term
|
Definition
SMS messages can contain links to malicious content. |
|
|
Term
|
Definition
Specifically crafted videos can introduce malware to a device. |
|
|
Term
|
Definition
Multi-Media Messaging Service |
|
|
Term
|
Definition
|
|
Term
Steps to Securing Mobile Devices |
|
Definition
Device Configuration
Mobile Management Tools
Configuring Device App Security |
|
|
Term
|
Definition
Disable Unused Features
Use Strong Authentication
Screen Lock
Passcode |
|
|
Term
|
Definition
Over the top content
Delivery of content over the internet without telecoms being directly involved. |
|
|
Term
What type of data can law enforcement agencies collect from mobile devices thanks to carrier built surveillance capabilities? |
|
Definition
|
|
Term
How do companies protect Remote Data at Rest on mobile devices? |
|
Definition
Each company possess decryption keys necessary to unlock data on their servers. |
|
|
Term
|
Definition
Separating business data from personal data |
|
|
Term
|
Definition
Separating storage into separate business and personal “containers” and managing each appropriately |
|
|
Term
Advantages to Storage Segmentation |
|
Definition
companies avoid data ownership privacy issues and legal concerns regarding a user’s personal data
Allows companies to delete only business data when necessary without touching personal data |
|
|
Term
|
Definition
Mobile Device Management
Tools that allow a device to be managed remotely by an organization. |
|
|
Term
|
Definition
Mobile Application Management
Tools and services responsible for distributing and controlling access to apps |
|
|
Term
|
Definition
Used to support the creation and editing/modification of digital content by multiple employees |
|
|
Term
|
Definition
Mobile Content Management
tuned to provide content management to hundreds or even thousands of mobile devices used by employees in an enterprise |
|
|
Term
|
Definition
Making it where applications can only be used within a specific geographical location |
|
|
Term
|
Definition
Internal Control Systems
Control locally or at remote locations by collecting, monitoring, and processing real-time data so that machines can directly control device. |
|
|
Term
|
Definition
System on a chip
All the necessary hardware components contained on a single microprocessor chip |
|
|
Term
|
Definition
Real Time Operating System
Receives very large amounts of data quickly, tuned to accommodate very high volumes of data immediately. |
|
|
Term
|
Definition
Internet of Things
Connecting any device to the internet for the purpose of sending and receiving data to be acted upon. |
|
|
Term
|
Definition
Body Area Networks
IoT in close proximity to a person's body, to monitor the person's vitals and other information. |
|
|
Term
|
Definition
Autonomous Body Sensor Network
Introduces actuators in addition to the sensors so immediate effects can be made on the human body.
Can expand the the use of functional electric stimulation to restore sensation, mobility, and function to those persons with paralyzed limbs and organs. |
|
|
Term
Why are IoT so vulnerable? |
|
Definition
They push function over security, leaving them with low defense against attackers.
They are very rarely patched if not automatically patched, which leaves them even more defenseless for extended periods of time. |
|
|