Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Mobile Security Threats

10

Flashcards

0/10

Still learning
StarStarStarStar

Malicious Apps

StarStarStarStar

Apps with malicious code can compromise device security and steal user data. Mitigation includes downloading apps from reputable sources, checking app permissions, and using mobile security solutions.

StarStarStarStar

Physical Device Theft

StarStarStarStar

Loss or theft of a mobile device can result in unauthorized access to private information. To mitigate this risk, use strong passwords or biometrics, enable device tracking, and use remote wipe capabilities.

StarStarStarStar

Man-in-the-Middle Attacks

StarStarStarStar

Man-in-the-Middle (MitM) attacks intercept and potentially alter the communication between two parties without their knowledge. Use encrypted connections and SSL/TLS to mitigate this risk.

StarStarStarStar

Rootkits

StarStarStarStar

Rootkits are tools that enable administrator-level access to a device, often without the user's consent. Mitigation involves using sophisticated antivirus tools that can detect and remove rootkits.

StarStarStarStar

Zero-Day Exploits

StarStarStarStar

Zero-Day Exploits take advantage of a security vulnerability on the same day that the vulnerability becomes generally known. Protect against these by using security solutions that include behavior-based threat detection.

StarStarStarStar

Phishing Attacks

StarStarStarStar

Phishing is a fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication. Mitigation includes educating users on recognizing phishing attempts and implementing anti-phishing software.

StarStarStarStar

Unpatched Software

StarStarStarStar

Using outdated software with unpatched vulnerabilities can lead to compromised mobile security. Regular software updates and patch management are key mitigation strategies.

StarStarStarStar

Social Engineering

StarStarStarStar

Social engineering involves manipulating users to divulge confidential information. Defenses include being aware of manipulation tactics, not sharing personal info via untrusted sources, and employee training.

StarStarStarStar

Insecure Wi-Fi Networks

StarStarStarStar

Connecting to insecure Wi-Fi networks can expose mobile devices to eavesdropping and data interception. Mitigation involves using Virtual Private Networks (VPNs) and avoiding public Wi-Fi for sensitive transactions.

StarStarStarStar

Spyware

StarStarStarStar

Spyware is malware that is installed on a mobile device without the user's knowledge and transmits the user's information covertly. Mitigation includes using antivirus software and being cautious about granting app permissions.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.