click below
click below
Normal Size Small Size show me how
Chapter 10- Security
Term | Definition |
---|---|
Android | The Google operating system for mobile devices that is not proprietary. |
application control | The tools and services responsible for distributing and controlling access to apps. |
asset tracking | Maintaining an accurate record of company-owned mobile devices. |
credential management | A secure repository for storing valuable authentication information on a mobile device. |
geo-fencing | Using a mobile device's GPS to define geographical boundaries where an app can be used. |
geo-tagging | Adding or allowing geographical identification data in a mobile app. |
inventory control | The operation of stockrooms where mobile devices are stored prior to their dispersal. |
iOS | The operating system for Apple mobile devices that is a closed and proprietary architecture. |
location services | Services that can identify the location of a person carrying a mobile device or a specific store or restaurant. |
lock screen | A technology that prevents a mobile device from being used until the user enters the correct passcode. |
mobile application management (MAM) | The tools and services responsible for distributing and controlling access to apps |
mobile device management (MDM) | Tools that allow a device to be managed remotely. |
off-boarding | The ability to quickly remove devices from the organization's network. |
on-boarding | The ability to rapidly enroll new mobile devices. |
remote wiping | The ability to remotely erase sensitive data stored on a mobile device. |
Secure Digital (SD) | A small form factor storage media of a variety of different types and sizes. |
smartphone | A mobile cell phone that has an operating system for running apps and accessing the Internet. |
tablet | Portable computing device that is generally larger than smartphones and smaller than notebooks, and is focused on ease of use. |