Module 05: Mobile, Embedded, and Specialized Device Security

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Wireless networks do not operate on which spectrums

1.2 GHz and 3.6 GHz

What pin is used in about 10% of 4 digit passcodes

1234

the recent versions of bluetooth, which are 5.x, can connect to devices up to

200 feet or 60 meters.

Bluetooth is a wireless protocol that has a limited range. Bluetooth versions up to 4.2 can connect to other Bluetooth devices within

32-feet or 10 meters range

malicious flash drive

A USB __________ __________ infected with malware.

Malicious USB cable

A USB cable embedded with a Wi-Fi controller that can receive commands from a nearby device to send malicious commands to the connected mobile device.

cellular telephony

A communications network in which the coverage area is divided into hexagon-shaped cells.

Arduino

A credit-card-sized motherboard that has a microcontroller instead of a microprocessor. It is mostly used as a controller for other devices.

multifunctional printer (MFP)

A device that combines the functions of a printer, copier, scanner, and fax machine.

external media access

A device with a USB connection that can function as a host (to which other devices may be connected such as a USB flash drive) for access to media.

unified endpoint management (UEM)

A group or class of software tools has a single management interface for mobile devices as well as computer devices.

field-programmable gate array (FPGA)

A hardware integrated circuit (IC) that can be programmed by the user.

Hotspots

A location where users can access the Internet with a wireless signal.

Raspberry Pi

A low-cost credit-card-sized computer motherboard.

Corporate owned

A mobile device that is purchased and owned by the enterprise.

personal identification number (PIN)

A passcode made up of numbers only.

Universal Serial Bus (USB) connectors

A port on mobile devices used for data transfer.

Global Positioning System (GPS)

A satellitebased navigation ____________ that provides information to a ______ receiver anywhere on (or near) the earth where there is an unobstructed line of sight to four or more ______ satellites.

screen lock

A security setting that prevents a mobile device from being accessed until the user enters the correct passcode permitting access.

system on a chip (SoC)

A single microprocessor chip on which all the necessary hardware components are contained.

third-party app store

A site from which unofficial apps can be downloaded.

USB On-the-Go (OTG)

A specification that allows a mobile device with a USB connection to act as either a host or a peripheral used for external media access.

supervisory control and data acquisition (SCADA)

A system that controls multiple industrial control systems (ICS).

mobile content management (MCM)

A system that is tuned to provide content management to mobile devices used by employees in an enterprise.

voice over IP (VoIP)

A technology that uses a data-based IP network to add digital voice clients and new voice applications onto the IP network.

remote wipe

A technology used to erase sensitive data stored on the mobile device.

GPS tagging or geo-tagging

Adding geographical identification data to media such as digital photos taken on a mobile device.

Bring your own device (BYOD)

Allows users to use their own personal mobile devices for business purposes.

real-time operating system (RTOS)

An operating system that is specifically designed for an SoC in an embedded system.

embedded systems occur in but are not limited to the following:

Automatic Teller Machine (ATM) Printers Digital watches Digital cameras Automobiles

You are explaining to your team members the security constraints that have made it a challenge for protecting a new embedded system. what would you NOT include as a constraint?

Availability

the following types of attacks are possible on the building automation systems - the building's heating, ventilation and air conditioning (HVAC) systems:

Buffer overflow Hardcoded secrets Device misconfigurations Cross-site scripting Path traversal Arbitrary file deletion Authentication bypass

rooting

Circumventing the installed built-in limitations on Android devices.

jailbreaking

Circumventing the installed built-in limitations on Apple iOS devices.

embedded system

Computer hardware and software contained within a larger system that is designed for a specific function.

Internet of Things (IoT)

Connecting any device to the Internet for the purpose of sending and receiving data to be acted upon.

smart meters

Digital meters that measure the amount of utilities consumed.

sideloading

Downloading unofficial apps.

Choose your own device (CYOD)

Employees choose from a limited selection of approved devices, but the employee pays the upfront cost of the device while the business owns the contract.

Corporate owned, personally enabled (COPE)

Employees choose from a selection of company approved devices.

heating, ventilation, and air conditioning (HVAC)

Environmental systems that provide and regulate heating and cooling.

True or False: Multiple SCADAs are controlled by an ICS.

False

what is needed by BlueStacks to operate?

Hyper-V

the following vulnerabilities can exist in System control and Data Acquisition (SCADA) include but are not limited to the following:

Inadequate input validation Poor update management Weak passwords Unmonitored system

Infrared

Light that is next to visible light on the light spectrum and was once used for data communications.

rich communication services (RCS)

Mobile device ____________________________ which can convert a texting app into a live chat platform and supports pictures, videos, location, stickers, and emojis.

firmware over-the-air (OTA) updates

Mobile operating system patches and updates that are distributed as an over-the-air (OTA) update.

What is a digital feature generally not included in personal vehicles

Near Field Communication

Which of the app types can be side-loaded on an iOS device?

None

In MDM terms, which choice would most quickly get a device enrolled on a network?

On-boarding

the following Unified Endpoint Management (UEM) features can help an IT administrator manage and administer IT assets:

Operating system deployment Software deployment Remote management License management Software and hardware inventory Updates management

Which of these is considered the strongest type of passcode to use on a mobile device?

Password (arguably biometrics)

the following features of Mobile Device Management (MDM) can be used by an organization:

Password enforcement Remote Location Remote Wipe Geofencing Encryption

push notification services

Sending SMS text messages to selected users or groups of users.

storage segmentation

Separating business data from personal data on a mobile device.

containerization

Separating storage into separate business and personal "containers."

Virtual desktop infrastructure (VDI)

Storing sensitive applications and data on a remote server that is accessed through a smartphone.

Industrial control systems (ICSs)

Systems that control locally or at remote locations by collecting, monitoring, and processing real-time data to control machines.

multimedia messaging service (MMS)

Text messages in which pictures, video, or audio can be included.

short message service (SMS)

Text messages of a maximum of 160 characters.

full disk encryption

The encryption of all user data on a mobile device.

geolocation

The process of identifying the geographical location of a device.

Mobile device management (MDM)

Tools that allow a device to be manage remotely by an organization.

mobile application management (MAM)

Tools that are used for distributing and controlling access to apps on mobile devices.

Content management

Tools used to support the creation and subsequent editing and modification of digital content by multiple employees.

True or False: Due to its slow speed and other limitations, infrared capabilities in mobile devices are rarely found today.

True

which method is used in sideloading an android device

USB(C)

carrier unlocking

Uncoupling a phone from a specific wireless provider.

This mobile device management tool can control mobile application access, content management and remote management?

United Data Management (UDM)

context-aware authentication

Using a ______________ual setting to validate a user. It generally requires knowledge of who the user is, what the user is requesting, how the user is connected, when the user is requesting information and where the user is located.

Tethering

Using a mobile device with an active Internet connection to share that connection with other mobile devices through Bluetooth or Wi-Fi.

geofencing

Using the mobile device's GPS to define geographical boundaries where an app can be used.

custom firmware

________________ that is written by users to run on their own mobile devices.


Kaugnay na mga set ng pag-aaral

NCLEX Review Quiz 4 Saunder's Questions (Ch. 39, 40, 54-57)

View Set

Networking Threats, Assessments, and Defenses (Unit 8 Review) - [Network Security]

View Set

Health Law and Ethics Chapter #1 Test #1

View Set

Dance History Vocabulary- Chapter 3

View Set

SOTW Vol 2 Ch.2 Test - The Early Days of Britain

View Set