Mobile Security Final

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/62

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:13 PM on 5/14/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

63 Terms

1
New cards

Risk Assessment

Identifies assets, threats, vulnerabilities, impacts, and mitigation strategies; broader than vulnerability assessment

2
New cards

Vulnerability Assessment

Identifies, evaluates, and documents vulnerabilities; often uses scanners

3
New cards

Interception

Risk where data traveling over a network is captured; mitigated with encryption

4
New cards

Availability

Ensuring systems and services remain accessible; mitigated with redundancy and fault tolerance

5
New cards

Access

Points where users enter/exit a network; controlled with firewalls, IPS, VPN

6
New cards

Exposure Factor (EF)

Percentage of asset loss from a threat

7
New cards

Single Loss Expectancy (SLE)

Monetary loss from one occurrence of a risk

8
New cards

Annual Rate of Occurrence (ARO)

Expected number of times a risk occurs per year

9
New cards

Annualized Loss Expectancy (ALE)

Yearly expected loss; calculated as ARO × SLE

10
New cards

Defense in Depth

Using multiple layers of security controls to protect systems

11
New cards

Version Analysis (Scanning)

Identifies vulnerabilities by checking software versions

12
New cards

Behavior Analysis (Scanning)

Identifies vulnerabilities by analyzing system responses

13
New cards

EAPoL

Protocol used to send authentication credentials between client and access point

14
New cards

RADIUS

Protocol used to authenticate users via a central server

15
New cards

Temporal Keys

Temporary encryption keys given after successful authentication

16
New cards

Passcode vs Biometrics

Passcodes are more legally secure; biometrics can be forced

17
New cards

Mobile Malware

Malicious software targeting mobile devices

18
New cards

Side-loaded Apps

Apps installed from outside official stores; higher security risk

19
New cards

Android Security Model

Linux-based system using sandboxing, permissions, and separate processes

20
New cards

Android Sandbox

Each app runs as its own user/process, isolating data and memory

21
New cards

File-System Permissions (Android)

Prevent apps from accessing other apps’ data unless explicitly allowed

22
New cards

Android Rooting

Gaining root access; bypasses security and increases malware risk

23
New cards

Android Fragmentation

Many devices and OS versions create inconsistent security

24
New cards

Android SDK

Tool used to build/decompile apps; can expose code for analysis

25
New cards

iOS Security Model

Walled garden approach with strict control over apps and system access

26
New cards

Application Provenance

Verifies app authenticity via digital signatures

27
New cards

iOS Sandbox

Isolates apps and prevents access to system/kernel or other apps

28
New cards

Jailbreaking

Removing iOS restrictions; weakens security

29
New cards

Android vs iOS (Core Difference)

Android is open and flexible; iOS is controlled and restricted

30
New cards

BYOD (Bring Your Own Device)

Employees use personal devices for work; creates security risks

31
New cards

MDM (Mobile Device Management)

Controls entire device; remote wipe, lock, update, enforce policies

32
New cards

MAM (Mobile Application Management)

Manages apps; distribution, licensing, configuration

33
New cards

Kali Linux

Security-focused OS with penetration testing tools

34
New cards

Airodump-ng

Tool used to scan wireless networks and collect data

35
New cards

BSSID

MAC address/identifier of an access point

36
New cards

ESSID

Network name (SSID)

37
New cards

Evil Twin Attack

Fake Wi-Fi access point with same SSID to trick users

38
New cards

Deauthentication Packet

Disconnects users from real AP to force reconnection to attacker

39
New cards

RADIUS Impersonation

Fake AP and RADIUS server capture authentication traffic

40
New cards

EAP-TLS

Certificate-based authentication that mitigates RADIUS attacks

41
New cards

Drive-by Browser Exploit

Infection occurs just by visiting a compromised website

42
New cards

Captive Portal Attack

Fake login page used to steal credentials

43
New cards

Public Certificate Authority Exploit

Abuse of SSL/TLS certificates for spoofing or interception

44
New cards

Developer Certificate Abuse

Stolen or forged certificates used to sign malicious apps

45
New cards

OWASP Mobile Risks

Common mobile vulnerabilities like weak auth, insecure storage, broken crypto

46
New cards

Binary Protections

Prevent reverse engineering and tampering of apps

47
New cards

Fingerprinting

Identifying a device/user based on characteristics

48
New cards

Proximity Fingerprinting

Identifying devices on a local network

49
New cards

Remote Fingerprinting

Identifying devices online via browser/system traits

50
New cards

Passive Fingerprinting

Observing existing traffic without interacting

51
New cards

Active Fingerprinting

Directly querying device for info

52
New cards

IMEI

Unique identifier for mobile devices

53
New cards

UDID

Unique identifier used by Apple devices

54
New cards

HTTP Headers (Fingerprinting)

Used to create temporary device fingerprints

55
New cards

Spyware

Tracks user activity like browsing, location, contacts

56
New cards

PUA (Potentially Unwanted Application)

App that tracks data or wastes resources without clear benefit

57
New cards

Stingray / IMSI Catcher

Fake cell tower used to intercept and track mobile devices

58
New cards

Stingray vs Evil Twin

Stingray targets cellular networks; evil twin targets Wi-Fi

59
New cards

Excessive App Permissions

Apps requesting unnecessary access (red flag for malware)

60
New cards

Mobile Browser Security

Use HTTPS, update software, block pop-ups, clear cache, check permissions

61
New cards

Strong Password Policy

Long passwords, auto-lock, and wipe after failed attempts

62
New cards

Remote Wipe

Ability to erase device data remotely if lost or stolen

63
New cards

Data Containerization

Separating business data from personal data on devices