2.7: Securing Mobile and Embedded Devices

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/8

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:45 PM on 9/8/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

9 Terms

1
New cards

Screen Locks

Restrict device access using facial recognition, PIN, fingerprint, or pattern. Devices may lock, require account login, or even erase data after multiple failed attempts to protect sensitive information.

2
New cards

Locator Apps & Remote Wipe

GPS-based tools to locate, sound alarm, display message, or wipe device remotely.

3
New cards

Patching & Updates

Mobile devices require regular OS updates and patches to maintain functionality, fix bugs, enhance features, and address security vulnerabilities.

4
New cards

Full Device Encryption

Encrypts all data on a mobile device. iOS uses passcode-based encryption, while Android devices (5.0+) have built-in full-disk encryption to protect data if the device is lost or stolen.

5
New cards

Remote Backup

Cloud-based backup solution that continuously or automatically saves mobile data and apps without cables. Enables one-click restoration of apps, settings, and user data.

6
New cards

Mobile Antivirus/Antimalware

iOS is closed and restrictive, reducing malware risk. Android is more open and vulnerable. Apps run in a sandbox, but third-party antivirus/antimalware apps are available to enhance protection.

7
New cards

Mobile Firewalls

Rarely used on mobile devices since most traffic is outbound. Android offers some firewall apps, while enterprises typically enforce access and restrictions through mobile device management (MDM) policies.

8
New cards

Mobile Device Policies

Managed through Mobile Device Management (MDM) systems. Enforce app, data, and camera restrictions; require screen locks and PINs; support security in BYOD (Bring Your Own Device) environments.

9
New cards

IoT Security

Security practices for Internet of Things devices, including sensors, smart home devices, wearables, and automation systems.

Often shipped with weak default credentials; best practices include changing defaults and isolating devices on separate networks.