Mobile Security
Models
Principles & COC
Threats
Key Terms
100

A secure (and most commonly used) biometric system for phones.

What is Fingerprint?

100

A model that requires authentication and authorization processes before granting access to a device or app.

What is Zero Trust Security?

100

This protects your device by scanning storage, files, and other applications to detect any suspicious activity.

What is an Antivirus Application?

100

This is a type of attack that occurs when data is intercepted between the device and the server/website.

What is a Man-In-The-Middle Attack?

100

The most widely used smartphone platform.

What is Android?

200

This type of security feature on mobile devices ensures that apps and data are only accessible after scanning your face.

What is Facial Recognition?

200

This uses multiple layers of defense to protect mobile devices, often combining encryption, authentication, and application management.

What is Defense in Depth?

200

Technology that creates a secure connection between a mobile device and a private network, protecting data transmission.

What is a VPN (Virtual Private Network)?

200

An action that can help protect your mobile device from security threats.

What is regularly updating your OS?

200

It involves a combination of hardware, software, and user practices to ensure the protection of sensitive data.

What is Mobile Security?

300

This describes bypassing device restrictions on mobile phones.

What are Jailbreaking (for IOS) and Rooting (for Android)?

300

A mobile security approach where each app operates in a sandbox to prevent unauthorized access to other apps and system data.

What is App Sandboxing?

300

A security principle that ensures users have only the minimum level of access necessary to perform their tasks.

What is the Least Privilege Principle?

300

A network that is setup by a malicious actor to appear as a secured public Wi-Fi or Hotspot.

What are Fake Access Points?

300

The process of converting data into a secure format that can only be accessed or decrypted with a specific key or password.

What is Data Encryption?

400

What is the feature on your mobile device that disables the cellular radio and other wireless connections?

What is Airplane Mode?

400

A security approach where the focus is on protecting the availability of mobile systems and data by addressing risks such as downtime or attacks that prevent access.

What is Availability in the CIA Triad?

400

This regulation mandates the secure storage and transmission of personal health information on mobile devices in healthcare settings.

What is HIPAA (Health Insurance Portability and Accountability Act)?

400

What hidden risks come with the flexibility of APK functionality on Android devices?

What is Malware Injection?

400

A wireless technology that facilitates short-range wireless communication between devices.

What is Bluetooth?

500

What technology is vulnerable to attacks such as relay attacks, data corruption, and eavesdropping?

What is NFC (Near Field Communication)?

500

A model that helps identify potential threats by analyzing risks, vulnerabilities, and the impact of security breaches.

What is Threat Modeling?

500

The policies that enterprises use to ensure employees' mobile devices comply with company security measures.

What are Mobile Device Management (MDM) Policies?

500

In what way can poorly coded or malicious apps expose systems to data theft?

What is introducing Application Vulnerabilities?

500

What is the term for locking mobile devices to a specific geographical area?

What is Geofencing?

M
e
n
u