A secure (and most commonly used) biometric system for phones.
What is Fingerprint?
A model that requires authentication and authorization processes before granting access to a device or app.
What is Zero Trust Security?
This protects your device by scanning storage, files, and other applications to detect any suspicious activity.
What is an Antivirus Application?
This is a type of attack that occurs when data is intercepted between the device and the server/website.
What is a Man-In-The-Middle Attack?
The most widely used smartphone platform.
What is Android?
This type of security feature on mobile devices ensures that apps and data are only accessible after scanning your face.
What is Facial Recognition?
This uses multiple layers of defense to protect mobile devices, often combining encryption, authentication, and application management.
What is Defense in Depth?
Technology that creates a secure connection between a mobile device and a private network, protecting data transmission.
What is a VPN (Virtual Private Network)?
An action that can help protect your mobile device from security threats.
What is regularly updating your OS?
It involves a combination of hardware, software, and user practices to ensure the protection of sensitive data.
What is Mobile Security?
This describes bypassing device restrictions on mobile phones.
What are Jailbreaking (for IOS) and Rooting (for Android)?
A mobile security approach where each app operates in a sandbox to prevent unauthorized access to other apps and system data.
What is App Sandboxing?
A security principle that ensures users have only the minimum level of access necessary to perform their tasks.
What is the Least Privilege Principle?
A network that is setup by a malicious actor to appear as a secured public Wi-Fi or Hotspot.
What are Fake Access Points?
The process of converting data into a secure format that can only be accessed or decrypted with a specific key or password.
What is Data Encryption?
What is the feature on your mobile device that disables the cellular radio and other wireless connections?
What is Airplane Mode?
A security approach where the focus is on protecting the availability of mobile systems and data by addressing risks such as downtime or attacks that prevent access.
What is Availability in the CIA Triad?
This regulation mandates the secure storage and transmission of personal health information on mobile devices in healthcare settings.
What is HIPAA (Health Insurance Portability and Accountability Act)?
What hidden risks come with the flexibility of APK functionality on Android devices?
What is Malware Injection?
A wireless technology that facilitates short-range wireless communication between devices.
What is Bluetooth?
What technology is vulnerable to attacks such as relay attacks, data corruption, and eavesdropping?
What is NFC (Near Field Communication)?
A model that helps identify potential threats by analyzing risks, vulnerabilities, and the impact of security breaches.
What is Threat Modeling?
The policies that enterprises use to ensure employees' mobile devices comply with company security measures.
What are Mobile Device Management (MDM) Policies?
In what way can poorly coded or malicious apps expose systems to data theft?
What is introducing Application Vulnerabilities?
What is the term for locking mobile devices to a specific geographical area?
What is Geofencing?