2.7: Securing Mobile and Embedded Devices

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/8

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

9 Terms

1
New cards

Screen Locks

Restrict access using facial recognition, PIN, fingerprint, or pattern; devices may lock, erase, or require account login after failed attempts.

2
New cards

Locator Apps & Remote Wipe

GPS-based tools to locate, sound alarm, display message, or wipe device remotely.

3
New cards

Patching & Updates

Mobile devices need regular OS updates and patches for features, bug fixes, and security.

4
New cards

Full Device Encryption

Encrypts all mobile data; iOS uses passcode-based encryption, Android has built-in encryption (5.0+).

5
New cards

Remote Backup

Cloud-based, continuous backups without cables; allows one-click restoration of apps and data.

6
New cards

Mobile Antivirus/Antimalware

iOS is closed and restrictive, Android is more open and vulnerable; apps run in sandbox, 3rd-party protection available.

7
New cards

Mobile Firewalls

Rarely used; most activity is outbound; Android has some firewall apps, enterprises enforce access through policies.

8
New cards

Mobile Device Policies

Managed with MDM; enforce app, data, and camera restrictions; require screen locks and PINs; support BYOD environments.

9
New cards

IoT Security

Includes sensors, smart devices, wearables, automation; often shipped with weak defaults—best practice is network isolation.