Chapter 7 Test 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

Mobile device management (MDM)

- A security strategy comprised of products and services that offer remote support for mobile devices, such as smart phones, laptops, and tablets

bit

- The smallest element of data and has a value of either 0 or 1

There are three key security considerations to keep in mind as you enter the wireless world:

1. Start with the right equipment 2. Make security an ongoing process, not a one-time event 3. Understand that not all threats are purposeful

Secure hypertext transfer protocol (SHTTP or HTTPS)

A combination of HTTP and SSL to provide encryption and secure identification of an Internet server

Worldwide Interoperability for Microwave Access (WiMAX)

A communications technology aimed at providing high-speed wireless data over metropolitan area networks

Geographic Information System (GIS)

A computer system that stores, organizes, analyzes, and displays geographic data.

RFID accelerometer

A device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds

Metropolitan Area Network (MAN)

A large computer network usually spanning a city

Wireless LAN (WLAN)

A local area network that uses radio signals to transmit and receive data over distances of a few hundred feet

Wireless Fidelity (Wi-Fi)

A means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves

Streaming

A method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred.

Wireless MAN (WMAN)

A metropolitan area network that uses radio signals to transmit and receive data

Mobile application management (MAM)

A security strategy that administers and enforces corporate epolicies for applications on mobile devices

Mobile information management (MIM)

A security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it

3G

A service that brings wireless broadband to mobile phones

Radio access network (RAN)

A technology that connects individual devices to other parts of a network through radio connections

Wireless WAN (WWAN)

A wide area network that uses radio signals to transmit and receive data

Digital divide

A worldwide gap giving advantage to those with access to technology

SSL Certificate

An electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company

Enterprise mobility management (EMM)

An enterprisewide security strategy to enforce corporate epolicies while enabling employee use of mobile devices such as smart phones and tablets Common areas of EMM

Local Area Network (LAN)

Connects a group of computers in close proximity, such as in an office building, school, or home

war driving

Deliberately searching for Wi-Fi signals while driving by in a vehicle

Asset tracking

Occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention

Smart phone

Offer more advanced computing ability and connectivity than basic cell phones

Personal area networks (PAN)

Provide communication over a short distance that is intended for use with devices that are owned and operated by a single user

Wide Area Network (WAN)

Spans a large geographic area such as a state, province, or country

Fast data

The application of big data analytics to smaller data sets in near real or real time in order to solve a problem or create business value

5G

The fifth-generation wireless broadband technology based on the 802.11ac standard engineered to greatly increase the speed and responsiveness of wireless networks

Bandwidth

The maximum amount of data that can pass from one point to another in a unit of time

Wi-Fi 6

The next generation of Wi-Fi expected to operate at 9.6 Gbps

war chalking

The practice of tagging pavement with codes displaying where Wi-Fi access is available

Mobile application development

The set of processes and procedures involved in writing software for use on wireless devices

Semipassive RFID tag

Uses a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader

Bluetooth

Wireless PAN technology that transmits signals over short distances between cell phones, computers, and other devices

Wired equivalent privacy (WEP)

an encryption algorithm designed to protect wireless transmission data

Wi-Fi infrastructure

includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles, along with additional equipment required to send out a Wi-Fi signal

IT consumerization

the blending of personal and business use of technology devices and applications

pervasive computing

the growing trend towards embedding microprocessors in everyday objects so they can communicate information

Bit rate

the number of bits transferred or received per unit of time

Radio Frequency Identification (RFID)

uses electronic tags and labels to identify objects wirelessly over short distances

Three Types of MDM Policies

•Bring Your Own Device •Choose Your Own Device •Company-Issued, Personally-Enabled

Wireless network benefits

•Reduce costs •Improve customer service •Offers real-time diagnostics •Enhances mobility •Supports real-time data •Promotes remote work •Improved security


Conjuntos de estudio relacionados

Accounting 2: Exam 2 (Ch. 6 & 7)

View Set

Chapter 43: Sleep Review Questions

View Set

MGMT 1005 Exam 3 Practice Questions

View Set

Unit 27: Single-Phase Transformers

View Set

Microsoft Exam MD-100: Windows 10 Manage Windows Updates

View Set

Bio 2 Osborne everything up to 3/7

View Set

Temporality, Strength, Consistency, Specificity, Dose-Response, ect.

View Set