1/33
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Jailbreaking (iOS)
Removing Apple’s restrictions to install unapproved apps or change restricted settings.
Rooting (Android)
Gaining full control over Android system files and settings (root access).
BYOD (Bring Your Own Device)
Deployment model where the employee owns the device; contains both personal and work data.
CYOD (Choose Your Own Device)
Company provides a list of approved devices; employee picks one and personal use is allowed.
COBO (Company Owned, Business Only)
Company-owned device restricted strictly to work-related tasks.
COPE (Company Owned, Personally Enabled)
Company-owned device where the employee is permitted to use it for personal tasks.
MDM (Mobile Device Management)
System used to control device settings, enforce policies, and perform remote wipes.
MAM (Mobile Application Management)
Security strategy that controls only specific apps containing company data, rather than the whole device.
UEM (Unified Endpoint Management)
A single platform to manage all device types, including phones, laptops, and tablets.
AUP (Acceptable Use Policy)
A set of rules outlining how devices and networks must be used by employees.
Geofencing
A virtual boundary created using location data (GPS/RFID) to trigger actions when a device enters/leaves.
Geotagging
The process of embedding geographical location metadata into photos or files.
Sideloading
Installing applications on a mobile device without using an official app store.
Carrier Unlocking
Removing the restriction that locks a mobile device to a specific cellular provider.
NFC (Near Field Communication)
Short-range wireless communication often used for contactless payments.
SDK (Software Development Kit)
A collection of software tools and libraries used by developers to create mobile apps.
BlueBorne
A Bluetooth vulnerability that allows attackers to take control of a device without user interaction.
Bluesnarfing
The unauthorized access of information (contacts, photos) from a wireless device via Bluetooth.
SS7 Vulnerability
A flaw in the cellular protocol used to intercept SMS messages or track locations.
SCADA (Supervisory Control and Data Acquisition)
Industrial control systems used for large-scale equipment management across wide geographic areas.
SoC (System on a Chip)
An integrated circuit that integrates all components of a computer or other electronic system into a single chip.
RTOS (Real-Time Operating System)
An OS intended to serve real-time applications that process data as it comes in, typically without buffering delays.
HTTP Port
80
HTTPS Port
443
SSH / SFTP Port
22
SIP (VoIP) Port
5060
NTP (Time) Port
123
SNMP Port
161
SMTP Port
25
RDP Port
3389
LDAP Port
636
POP3 Port
110
IMAP Port
993
Mobile Device Connection
Bluetooth, WiFi, GPS, NFC, Infrared, Cellular Data, ANT, USB (Wired)