1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Device encryption
The use of encryption to help protect sensitive data on a device.
Facial recognition
An authentication type that requires users to scan their face to unlock a device.
PIN codes
An authentication type that requires users to enter a numeric code to unlock the device and access sensitive information.
Fingerprint
An authentication type that requires users to provide a fingerprint to unlock a device.
Pattern
An authentication type that requires users to draw a specific shape or design on the screen to unlock the device.
Swipe
An authentication type that requires users to swipe their finger across a designated area on the screen to unlock the device, noted as very insecure.
Configuration profiles
XML or JSON formatted files used to manage secure devices by enforcing specific settings/policies, typically used by Mobile Device Management (MDM) software.
OS updates
A security best practice that ensures your operating system is kept up-to-date with security fixes.
Application updates
A security best practice that ensures all applications present on a device are kept up-to-date.
Antivirus
Software that protects a device from viruses by detecting and removing them before they can harm the system.
Anti-malware
Software that protects a device from malware by detecting and removing it before it can harm the system.
Content filtering
A security measure that restricts access to certain websites or content based on predefined criteria.
Locator application
Software that allows users to track the location of their mobile devices if they are lost.
Remote wipes
A security feature that enables users to erase all data from their mobile devices remotely.
Remote backup applications
Software solutions that automatically copy data from mobile devices to a secure off-site location.
Failed log-in attempts restrictions
Policies that limit the number of unsuccessful attempts at which a restriction will be applied to an account.
MDM
Software solution used to apply corporate/security policies to a device.
BYOD (Bring Your Own Device)
Employees use their personal devices for work-related tasks, posing security challenges.
Corporate-owned devices
Devices owned and managed by the organization allowing for stricter security controls.
Profile security requirements
Guidelines outlining necessary security measures to protect sensitive data on devices.