Mobile security Definitions

Search Definitions
  • A

    Active Directory Federation Services (AD FS)

    Active Directory Federation Services (AD FS) is a feature of the Windows Server operating system (OS) that extends end users' single sign-on (SSO) access to applications and systems outside the corporate firewall.

  • B

    bluesnarfing

    Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.

  • C

    cell phone jammer

    A cell phone jammer is a device that blocks transmission or reception of signals, usually by creating some form of interference at the same frequency ranges that cell phones use... (Continued)

  • Cisco Identity Services Engine (ISE)

    Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches.

  • contextual computing

    Contextual computing, also called context-aware computing, is the use of software and hardware to automatically collect and analyze data about a device's surroundings in order to present relevant, actionable information to the end user.

  • D

    disappearing e-mail

    Disappearing e-mail is a message sent using a type of distribution management tool for e-mail.

  • drive-by spamming

    Drive-by spamming is a variation of drive-by hacking in which the perpetrators gain access to a vulnerable wireless local area network (WLAN) and use that access to send huge volumes of spam.

  • F

    FeliCa

  • I

    identity as a Service (IDaaS)

    Identity as a Service (IDaaS) is an authentication infrastructure that is built, hosted and managed by a third-party service provider.

  • L

    Lookout Mobile Security

    Lookout Mobile Security is an antimalware, data backup and remote management app for smartphones and tablets.

  • M

    Microsoft System Center Mobile Device Manager (MSCMDM)

    Microsoft System Center Mobile Device Manager (MSCMDM) is server-based software that allows enterprise IT professionals to manage and automate tasks for Windows Mobile devices. (Continued...)

  • Mobile Active Defense (MAD)

    Mobile Active Defense’s main product is the Mobile Enterprise Compliance and Security Server (MECS).

  • mobile desktop virtualization

    Mobile desktop virtualization is the delivery of a virtual machine (VM) image that runs business applications to a tablet or smartphone.

  • mobile information management (MIM)

    Mobile information management (MIM) is a device-agnostic security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it.

  • mobile malware

    Mobile malware is malicious software specifically written to attack mobile devices such as smartphones, tablets, and smartwatches.

  • mobile phone virus

    A mobile phone virus is a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another. (Continued...)

  • Mobile Threat Defense (MTD)

    Mobile Threat Defense (MTD) is a security software meant to protect organizations and individual users from security threats on mobile platforms.

  • mobile VPN (mobile virtual private network)

    A mobile VPN is a networking configuration that enables mobile devices such as notebook computers or personal digital assistants (PDAs) to access a virtual private network (VPN) or an intranet while moving from one place to another... (Continued)

  • N

    no-swipe credit card

    A no-swipe credit card is a credit card equipped with a radio frequency (RF) transponder that allows for purchases without the need for passing the card through a traditional magnetic-stripe detection machine. The card holder can simply come within approximately 0.6 meter (2 feet) of the checkout terminal. The terminal emits a tone or displays a confirmation when the transaction has been authorized and payment made... (Continued)

  • P

    podslurping (slurping)

    Podslurping (sometimes just called slurping) is the unauthorized download of data from a computer to a small device with storage capacity, such as a flash drive or an iPod or other MP3 player... (Continued)

  • R

    real-time location system (RTLS)

    A real-time location system (RTLS) is one of a number of technologies used to pinpoint the current geographic position and location of a target.

  • RPC over HTTP

    RPC over HTTP (Remote Procedure Call over HTTP) is a protocol that allows a client on the Internet to connect securely to a Microsoft Exchange Server without having to log into a virtual private network (VPN) first.

  • S

    Samsung for Enterprise (SAFE)

    Samsung for Enterprise (SAFE) is a line of smartphones and tablets manufactured to meet specific enterprise management and security criteria, including interoperability with third-party mobile device management (MDM) and virtual private network (VPN) software.

  • screaming cell phone

    A screaming cell phone is a cellular telephone that is programmed to emit a noise like human screaming. (Continued)

  • SMiShing (SMS phishing)

    SMiShing is a mobile phone security attack in which the user is tricked into downloading a Trojan horse, virus or other malware onto his phone. SMiShing is short for "SMS phishing." (Continued)

  • SMS spam (cell phone spam or short messaging service spam)

    SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS). The practice is fairly rare in North America, but has been common in Japan for years. In 2001-2002, the systems at DoCoMo, the country's major service provider, were overcome by the volume of SMS spam, causing users' screens to freeze and spreading programs that caused the phones to dial emergency numbers.

  • Snapchat

    Snapchat is a mobile app that allows users to send and receive 'self-destructing' photos and videos. Photos and videos taken with the app are called snaps.

  • Stratellite

    A Stratellite is a rigid framed airship that hovers in a fixed position in the lower stratosphere and carries one or more repeaters to create wireless communication networks. (Continued...)

  • U

    unlocked cell phone

    An unlocked cell phone is a cellular telephone handset that can be used with more than one service provider, making it easy for a user to switch from one cellular network to another... (Continued)

  • W

    war driving (access point mapping)

    War driving, also called access point mapping, is the act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere.

  • warchalking (war chalking)

    Warchalking is a grass roots effort to create a standard iconography for public Wi-Fi access.

  • Wi-Fi Protected Access (WPA)

    Wi-Fi Protected Access (WPA) is a security standard for users of computing devices equipped with wireless internet connections, or Wi-Fi.

  • Wireless Transport Layer Security (WTLS)

    Wireless Transport Layer Security (WTLS) is the security level for Wireless Application Protocol (WAP) applications.

  • workstation

    A workstation is a computer intended for individual use that is faster and more capable than a personal computer.

-ADS BY GOOGLE

SearchNetworking

SearchUnifiedCommunications

SearchSecurity

Close