1/8
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Screen Locks
Restrict device access using facial recognition, PIN, fingerprint, or pattern. Devices may lock, require account login, or even erase data after multiple failed attempts to protect sensitive information.
Locator Apps & Remote Wipe
GPS-based tools to locate, sound alarm, display message, or wipe device remotely.
Patching & Updates
Mobile devices require regular OS updates and patches to maintain functionality, fix bugs, enhance features, and address security vulnerabilities.
Full Device Encryption
Encrypts all data on a mobile device. iOS uses passcode-based encryption, while Android devices (5.0+) have built-in full-disk encryption to protect data if the device is lost or stolen.
Remote Backup
Cloud-based backup solution that continuously or automatically saves mobile data and apps without cables. Enables one-click restoration of apps, settings, and user data.
Mobile Antivirus/Antimalware
iOS is closed and restrictive, reducing malware risk. Android is more open and vulnerable. Apps run in a sandbox, but third-party antivirus/antimalware apps are available to enhance protection.
Mobile Firewalls
Rarely used on mobile devices since most traffic is outbound. Android offers some firewall apps, while enterprises typically enforce access and restrictions through mobile device management (MDM) policies.
Mobile Device Policies
Managed through Mobile Device Management (MDM) systems. Enforce app, data, and camera restrictions; require screen locks and PINs; support security in BYOD (Bring Your Own Device) environments.
IoT Security
Security practices for Internet of Things devices, including sensors, smart home devices, wearables, and automation systems.
Often shipped with weak default credentials; best practices include changing defaults and isolating devices on separate networks.