CompTIA Security+ (SY0-601): Mobile Device Security
This section focuses on mobile security concerns such as SIM cloning, Bluetooth-based attacks (bluejacking and bluesnarfing), and geotagging risks. It also highlights device management strategies like BYOD and CYOD, emphasizing storage segmentation to protect corporate data on personal devices.
SIM & SIM Cloning
Key Terms
SIM & SIM Cloning
Subscriber Identity Module:
Integrated circuit that securely stores the international mobile subscriber identity (IMS...
Bluejacking & Bluesnarfing
Bluejacking:
Sending of unsolicited messages to Bluetooth-enabled devices
Bluesnarfi...
Geotagging
Embedding of the geolocation coordinates into a piece of data (i.e., a photo)
BYOD: Storage Segmentation
Creating a clear separation between personal and company data on a single device
CYOD: ...
MDM
Mobile Device Management:
Centralized software solution for remote administration and c...
MCM
Mobile Content Management:
Secure access to data
Prote...
Related Flashcard Decks
| Term | Definition |
|---|---|
SIM & SIM Cloning | Subscriber Identity Module: SIM Cloning: |
Bluejacking & Bluesnarfing | Bluejacking: Bluesnarfing: |
Geotagging | Embedding of the geolocation coordinates into a piece of data (i.e., a photo) |
BYOD: Storage Segmentation | Creating a clear separation between personal and company data on a single device CYOD: Choose Your Own Device |
MDM | Mobile Device Management: Centralized software solution for remote administration and configuration of mobile devices |
MCM | Mobile Content Management: Secure access to data Protect data from outsiders DLP Ensuring data is encrypted |
MAM | Mobile Application Management: Provision, update & remove apps Keep everyone on same version Can create an enterprise app catalog Monitor app use Remote wipe app data |
SEAndroid | Security Enhancements for Android NSA project |