Chapter 7 Test 2
Mobile device management (MDM)
- A security strategy comprised of products and services that offer remote support for mobile devices, such as smart phones, laptops, and tablets
bit
- The smallest element of data and has a value of either 0 or 1
There are three key security considerations to keep in mind as you enter the wireless world:
1. Start with the right equipment 2. Make security an ongoing process, not a one-time event 3. Understand that not all threats are purposeful
Secure hypertext transfer protocol (SHTTP or HTTPS)
A combination of HTTP and SSL to provide encryption and secure identification of an Internet server
Worldwide Interoperability for Microwave Access (WiMAX)
A communications technology aimed at providing high-speed wireless data over metropolitan area networks
Geographic Information System (GIS)
A computer system that stores, organizes, analyzes, and displays geographic data.
RFID accelerometer
A device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds
Metropolitan Area Network (MAN)
A large computer network usually spanning a city
Wireless LAN (WLAN)
A local area network that uses radio signals to transmit and receive data over distances of a few hundred feet
Wireless Fidelity (Wi-Fi)
A means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves
Streaming
A method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred.
Wireless MAN (WMAN)
A metropolitan area network that uses radio signals to transmit and receive data
Mobile application management (MAM)
A security strategy that administers and enforces corporate epolicies for applications on mobile devices
Mobile information management (MIM)
A security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it
3G
A service that brings wireless broadband to mobile phones
Radio access network (RAN)
A technology that connects individual devices to other parts of a network through radio connections
Wireless WAN (WWAN)
A wide area network that uses radio signals to transmit and receive data
Digital divide
A worldwide gap giving advantage to those with access to technology
SSL Certificate
An electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company
Enterprise mobility management (EMM)
An enterprisewide security strategy to enforce corporate epolicies while enabling employee use of mobile devices such as smart phones and tablets Common areas of EMM
Local Area Network (LAN)
Connects a group of computers in close proximity, such as in an office building, school, or home
war driving
Deliberately searching for Wi-Fi signals while driving by in a vehicle
Asset tracking
Occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention
Smart phone
Offer more advanced computing ability and connectivity than basic cell phones
Personal area networks (PAN)
Provide communication over a short distance that is intended for use with devices that are owned and operated by a single user
Wide Area Network (WAN)
Spans a large geographic area such as a state, province, or country
Fast data
The application of big data analytics to smaller data sets in near real or real time in order to solve a problem or create business value
5G
The fifth-generation wireless broadband technology based on the 802.11ac standard engineered to greatly increase the speed and responsiveness of wireless networks
Bandwidth
The maximum amount of data that can pass from one point to another in a unit of time
Wi-Fi 6
The next generation of Wi-Fi expected to operate at 9.6 Gbps
war chalking
The practice of tagging pavement with codes displaying where Wi-Fi access is available
Mobile application development
The set of processes and procedures involved in writing software for use on wireless devices
Semipassive RFID tag
Uses a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader
Bluetooth
Wireless PAN technology that transmits signals over short distances between cell phones, computers, and other devices
Wired equivalent privacy (WEP)
an encryption algorithm designed to protect wireless transmission data
Wi-Fi infrastructure
includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles, along with additional equipment required to send out a Wi-Fi signal
IT consumerization
the blending of personal and business use of technology devices and applications
pervasive computing
the growing trend towards embedding microprocessors in everyday objects so they can communicate information
Bit rate
the number of bits transferred or received per unit of time
Radio Frequency Identification (RFID)
uses electronic tags and labels to identify objects wirelessly over short distances
Three Types of MDM Policies
•Bring Your Own Device •Choose Your Own Device •Company-Issued, Personally-Enabled
Wireless network benefits
•Reduce costs •Improve customer service •Offers real-time diagnostics •Enhances mobility •Supports real-time data •Promotes remote work •Improved security