Term
|
Definition
| Smaller self contained devices that are easily transported. |
|
|
Term
|
Definition
| Portable computer that is smaller Than A Laptop |
|
|
Term
|
Definition
| Portable computer that is smaller than a Notebook. |
|
|
Term
|
Definition
| Limited use computer made to run web applications. |
|
|
Term
| Mobile Device Connectivity Methods |
|
Definition
Cellular Satellite Infrared ANT USB Connections |
|
|
Term
|
Definition
| A proprietary wireless network technology used primarily by sensors for communicating data. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Corporate Owned Personally Enabled |
|
|
Term
|
Definition
|
|
Term
|
Definition
Virtual Device Infrastructure
(It's like a VM on a Smartphone, but behind the scenes in the cloud.) |
|
|
Term
|
Definition
| Device is purchased and owned by the enterprise for company use own. |
|
|
Term
| Benefits of BYOD, COPE and CYOD |
|
Definition
Management Flexibility
less oversight
cost savings
increased performance
employee choice |
|
|
Term
| What percent of all healthcare security breaches were to the loss or theft of a mobile device? |
|
Definition
|
|
Term
| What percent of all laptop thefts occurred from unattended cars? |
|
Definition
|
|
Term
| What percent of laptop thefts occurred in airports and hotels? |
|
Definition
|
|
Term
| What percent of laptop thefts occurred in restaurants? |
|
Definition
|
|
Term
| How do Users Update on Apple IOS? |
|
Definition
| Itunes or over the air updates with their carrier. |
|
|
Term
| Does Google create the hardware that Android runs on? |
|
Definition
|
|
Term
| It is very difficult to update Mobile devices of what kind? |
|
Definition
|
|
Term
| What features of mobile devices can provoke physical attacks? |
|
Definition
GPS
Unauthorized Recording |
|
|
Term
|
Definition
| An unsecured mobile device may infect other tethered mobile devices or the corporate network. |
|
|
Term
|
Definition
On the Go
Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to the device. |
|
|
Term
| Connecting to Public Networks |
|
Definition
| Because these networks are beyond the control of the organization, attackers can eavesdrop on the data transmissions and view sensitive information |
|
|
Term
|
Definition
| Matrix or two dimensional barcode which can be read by an imaging device. |
|
|
Term
| How can attackers convince individuals to scan their QR Codes? |
|
Definition
| By releasing advertisements that look official, but include a malicious QR code that claims to be from a reputable source. |
|
|
Term
|
Definition
| SMS messages can contain links to malicious content. |
|
|
Term
|
Definition
| Specifically crafted videos can introduce malware to a device. |
|
|
Term
|
Definition
| Multi-Media Messaging Service |
|
|
Term
|
Definition
|
|
Term
| Steps to Securing Mobile Devices |
|
Definition
Device Configuration
Mobile Management Tools
Configuring Device App Security |
|
|
Term
|
Definition
Disable Unused Features
Use Strong Authentication
Screen Lock
Passcode |
|
|
Term
|
Definition
Over the top content
Delivery of content over the internet without telecoms being directly involved. |
|
|
Term
| What type of data can law enforcement agencies collect from mobile devices thanks to carrier built surveillance capabilities? |
|
Definition
|
|
Term
| How do companies protect Remote Data at Rest on mobile devices? |
|
Definition
| Each company possess decryption keys necessary to unlock data on their servers. |
|
|
Term
|
Definition
| Separating business data from personal data |
|
|
Term
|
Definition
| Separating storage into separate business and personal “containers” and managing each appropriately |
|
|
Term
| Advantages to Storage Segmentation |
|
Definition
companies avoid data ownership privacy issues and legal concerns regarding a user’s personal data
Allows companies to delete only business data when necessary without touching personal data |
|
|
Term
|
Definition
Mobile Device Management
Tools that allow a device to be managed remotely by an organization. |
|
|
Term
|
Definition
Mobile Application Management
Tools and services responsible for distributing and controlling access to apps |
|
|
Term
|
Definition
| Used to support the creation and editing/modification of digital content by multiple employees |
|
|
Term
|
Definition
Mobile Content Management
tuned to provide content management to hundreds or even thousands of mobile devices used by employees in an enterprise |
|
|
Term
|
Definition
| Making it where applications can only be used within a specific geographical location |
|
|
Term
|
Definition
Internal Control Systems
Control locally or at remote locations by collecting, monitoring, and processing real-time data so that machines can directly control device. |
|
|
Term
|
Definition
System on a chip
All the necessary hardware components contained on a single microprocessor chip |
|
|
Term
|
Definition
Real Time Operating System
Receives very large amounts of data quickly, tuned to accommodate very high volumes of data immediately. |
|
|
Term
|
Definition
Internet of Things
Connecting any device to the internet for the purpose of sending and receiving data to be acted upon. |
|
|
Term
|
Definition
Body Area Networks
IoT in close proximity to a person's body, to monitor the person's vitals and other information. |
|
|
Term
|
Definition
Autonomous Body Sensor Network
Introduces actuators in addition to the sensors so immediate effects can be made on the human body.
Can expand the the use of functional electric stimulation to restore sensation, mobility, and function to those persons with paralyzed limbs and organs. |
|
|
Term
| Why are IoT so vulnerable? |
|
Definition
They push function over security, leaving them with low defense against attackers.
They are very rarely patched if not automatically patched, which leaves them even more defenseless for extended periods of time. |
|
|