click below
click below
Normal Size Small Size show me how
Chapter 10- Security
| Term | Definition |
|---|---|
| Android | The Google operating system for mobile devices that is not proprietary. |
| application control | The tools and services responsible for distributing and controlling access to apps. |
| asset tracking | Maintaining an accurate record of company-owned mobile devices. |
| credential management | A secure repository for storing valuable authentication information on a mobile device. |
| geo-fencing | Using a mobile device's GPS to define geographical boundaries where an app can be used. |
| geo-tagging | Adding or allowing geographical identification data in a mobile app. |
| inventory control | The operation of stockrooms where mobile devices are stored prior to their dispersal. |
| iOS | The operating system for Apple mobile devices that is a closed and proprietary architecture. |
| location services | Services that can identify the location of a person carrying a mobile device or a specific store or restaurant. |
| lock screen | A technology that prevents a mobile device from being used until the user enters the correct passcode. |
| mobile application management (MAM) | The tools and services responsible for distributing and controlling access to apps |
| mobile device management (MDM) | Tools that allow a device to be managed remotely. |
| off-boarding | The ability to quickly remove devices from the organization's network. |
| on-boarding | The ability to rapidly enroll new mobile devices. |
| remote wiping | The ability to remotely erase sensitive data stored on a mobile device. |
| Secure Digital (SD) | A small form factor storage media of a variety of different types and sizes. |
| smartphone | A mobile cell phone that has an operating system for running apps and accessing the Internet. |
| tablet | Portable computing device that is generally larger than smartphones and smaller than notebooks, and is focused on ease of use. |