Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Mobile security

Index Mobile security

Mobile security, or more specifically mobile device security, has become increasingly important in mobile computing. [1]

110 relations: A5/1, A5/2, Agence nationale de la sécurité des systèmes d'information, Android (operating system), Antivirus software, App Store (iOS), Application programming interface, Application software, Backdoor (computing), Biometrics, Block cipher, Bluetooth, Browser security, Cabir (computer worm), CAPTCHA, Chain of trust, Code signing, Commwarrior (computer virus), Computer network, Computer security, Computer virus, Computer worm, Data integrity, Digital signature, Email, Email spam, Encryption, ETSI, Exploit (computer security), Facebook, File system permissions, Firewall (computing), Firmware, FreeBSD, Ghost Push, Global Positioning System, Grey hat, Group identifier, GSM, IEEE 802.11i-2004, IMSI-catcher, Information privacy, Information security, Information system, Intellectual property, Internet, Internet security, IOS, IOS jailbreaking, IPhone, ..., Java virtual machine, KASUMI, Library (computing), Libtiff, Linux, List of IEEE publications, Login, Malware, Memory protection, Microsoft, Microsoft Windows, Mobile computing, Mobile malware, Mobile operating system, Mobile secure gateway, Mobile Web, Morphology (biology), Multimedia Messaging Service, Network monitoring, Operating system, Palm OS, Password cracking, Phishing, Phone hacking, Pre-shared key, Privilege escalation, Public key certificate, Read-only memory, Resource management, Risk, Rootkit, Sandbox (computer security), Security through obscurity, Siemens S55, SIS (file format), Smartphone, SMS, Smudge attack, Streaming media, Subscriber identity module, Symbian, Telephone call, Telephone tapping, Temporal Key Integrity Protocol, Transmission Control Protocol, Trojan horse (computing), Turing test, Twitter, University of Pennsylvania, Vulnerability (computing), Wi-Fi, Wi-Fi Protected Access, Wired (magazine), Wired Equivalent Privacy, Wireless Public Key Infrastructure, Wireless security, Zombie (computer science), .NET Framework, 3G, 4G. Expand index (60 more) »

A5/1

A5/1 is a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard.

New!!: Mobile security and A5/1 · See more »

A5/2

A5/2 is a stream cipher used to provide voice privacy in the GSM cellular telephone protocol.

New!!: Mobile security and A5/2 · See more »

Agence nationale de la sécurité des systèmes d'information

The Agence nationale de la sécurité des systèmes d'information (ANSSI; English: National Cybersecurity Agency of France) is a French service created on 7 July 2009 with responsibility for computer security.

New!!: Mobile security and Agence nationale de la sécurité des systèmes d'information · See more »

Android (operating system)

Android is a mobile operating system developed by Google, based on a modified version of the Linux kernel and other open source software and designed primarily for touchscreen mobile devices such as smartphones and tablets.

New!!: Mobile security and Android (operating system) · See more »

Antivirus software

Antivirus software, or anti-virus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

New!!: Mobile security and Antivirus software · See more »

App Store (iOS)

The App Store is a digital distribution platform, developed and maintained by Apple Inc., for mobile apps on its iOS operating system.

New!!: Mobile security and App Store (iOS) · See more »

Application programming interface

In computer programming, an application programming interface (API) is a set of subroutine definitions, protocols, and tools for building software.

New!!: Mobile security and Application programming interface · See more »

Application software

An application software (app or application for short) is a computer software designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user.

New!!: Mobile security and Application software · See more »

Backdoor (computing)

A backdoor is a method, often secret, of bypassing normal authentication or encryption in a computer system, a product, or an embedded device (e.g. a home router), or its embodiment, e.g. as part of a cryptosystem, an algorithm, a chipset, or a "homunculus computer" (such as that as found in Intel's AMT technology).

New!!: Mobile security and Backdoor (computing) · See more »

Biometrics

Biometrics is the technical term for body measurements and calculations.

New!!: Mobile security and Biometrics · See more »

Block cipher

In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.

New!!: Mobile security and Block cipher · See more »

Bluetooth

Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485GHz) from fixed and mobile devices, and building personal area networks (PANs).

New!!: Mobile security and Bluetooth · See more »

Browser security

Browser security is the application of Internet security to web browsers in order to protect networked data and computer systems from breaches of privacy or malware.

New!!: Mobile security and Browser security · See more »

Cabir (computer worm)

Cabir (also known as Caribe, SybmOS/Cabir, Symbian/Cabir and EPOC.cabir) is the name of a computer worm developed in 2004 that is designed to infect mobile phones running Symbian OS.

New!!: Mobile security and Cabir (computer worm) · See more »

CAPTCHA

A CAPTCHA (an acronym for "Completely Automated Public '''T'''uring test to tell Computers and Humans Apart") is a type of challenge–response test used in computing to determine whether or not the user is human.

New!!: Mobile security and CAPTCHA · See more »

Chain of trust

In computer security, a chain of trust is established by validating each component of hardware and software from the end entity up to the root certificate.

New!!: Mobile security and Chain of trust · See more »

Code signing

Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed.

New!!: Mobile security and Code signing · See more »

Commwarrior (computer virus)

Commwarrior is a Symbian Bluetooth worm that was the first to spread via Multimedia Messaging Service (MMS) and Bluetooth.

New!!: Mobile security and Commwarrior (computer virus) · See more »

Computer network

A computer network, or data network, is a digital telecommunications network which allows nodes to share resources.

New!!: Mobile security and Computer network · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Mobile security and Computer security · See more »

Computer virus

A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.

New!!: Mobile security and Computer virus · See more »

Computer worm

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.

New!!: Mobile security and Computer worm · See more »

Data integrity

Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle, and is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data.

New!!: Mobile security and Data integrity · See more »

Digital signature

A digital signature is a mathematical scheme for presenting the authenticity of digital messages or documents.

New!!: Mobile security and Digital signature · See more »

Email

Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices.

New!!: Mobile security and Email · See more »

Email spam

Email spam, also known as junk email, is a type of electronic spam where unsolicited messages are sent by email.

New!!: Mobile security and Email spam · See more »

Encryption

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

New!!: Mobile security and Encryption · See more »

ETSI

The European Telecommunications Standards Institute (ETSI) is an independent, not-for-profit, standardization organization in the telecommunications industry (equipment makers and network operators) in Europe, headquartered in Sophia-Antipolis, France, with worldwide projection.

New!!: Mobile security and ETSI · See more »

Exploit (computer security)

An exploit (from the English verb to exploit, meaning "to use something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).

New!!: Mobile security and Exploit (computer security) · See more »

Facebook

Facebook is an American online social media and social networking service company based in Menlo Park, California.

New!!: Mobile security and Facebook · See more »

File system permissions

Most file systems have methods to assign permissions or access rights to specific users and groups of users.

New!!: Mobile security and File system permissions · See more »

Firewall (computing)

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

New!!: Mobile security and Firewall (computing) · See more »

Firmware

In electronic systems and computing, firmware is a specific class of computer software that provides the low-level control for the device's specific hardware.

New!!: Mobile security and Firmware · See more »

FreeBSD

FreeBSD is a free and open-source Unix-like operating system descended from Research Unix via the Berkeley Software Distribution (BSD).

New!!: Mobile security and FreeBSD · See more »

Ghost Push

Ghost Push is a family of malware that infects the Android OS by automatically gaining root access, downloading malicious software, masquerading as a system app, and then losing root access, which then makes it virtually impossible to remove the infection even by factory reset unless the firmware is reflashed.

New!!: Mobile security and Ghost Push · See more »

Global Positioning System

The Global Positioning System (GPS), originally Navstar GPS, is a satellite-based radionavigation system owned by the United States government and operated by the United States Air Force.

New!!: Mobile security and Global Positioning System · See more »

Grey hat

The term "grey hat", alternatively spelled as "greyhat" or "gray hat", refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.

New!!: Mobile security and Grey hat · See more »

Group identifier

In Unix-like systems, multiple users can be put into groups.

New!!: Mobile security and Group identifier · See more »

GSM

GSM (Global System for Mobile communications) is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation digital cellular networks used by mobile devices such as tablets, first deployed in Finland in December 1991.

New!!: Mobile security and GSM · See more »

IEEE 802.11i-2004

IEEE 802.11i-2004, or 802.11i for short, is an amendment to the original IEEE 802.11, implemented as Wi-Fi Protected Access II (WPA2).

New!!: Mobile security and IEEE 802.11i-2004 · See more »

IMSI-catcher

An International Mobile Subscriber Identity-catcher, or IMSI-catcher, is a telephone eavesdropping device used for intercepting mobile phone traffic and tracking location data of mobile phone users.

New!!: Mobile security and IMSI-catcher · See more »

Information privacy

Information privacy, or data privacy (or data protection), is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.

New!!: Mobile security and Information privacy · See more »

Information security

Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.

New!!: Mobile security and Information security · See more »

Information system

An information system (IS) is an organized system for the collection, organization, storage and communication of information.

New!!: Mobile security and Information system · See more »

Intellectual property

Intellectual property (IP) is a category of property that includes intangible creations of the human intellect, and primarily encompasses copyrights, patents, and trademarks.

New!!: Mobile security and Intellectual property · See more »

Internet

The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide.

New!!: Mobile security and Internet · See more »

Internet security

Internet security is a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level, as it applies to other applications or operating systems as a whole.

New!!: Mobile security and Internet security · See more »

IOS

iOS (formerly iPhone OS) is a mobile operating system created and developed by Apple Inc. exclusively for its hardware.

New!!: Mobile security and IOS · See more »

IOS jailbreaking

iOS jailbreaking is privilege escalation for the purpose of removing software restrictions imposed by Apple on iOS, tvOS and watchOS.

New!!: Mobile security and IOS jailbreaking · See more »

IPhone

iPhone is a line of smartphones designed and marketed by Apple Inc. The iPhone line of products use Apple's iOS mobile operating system software.

New!!: Mobile security and IPhone · See more »

Java virtual machine

A Java virtual machine (JVM) is a virtual machine that enables a computer to run Java programs as well as programs written in other languages and compiled to Java bytecode.

New!!: Mobile security and Java virtual machine · See more »

KASUMI

KASUMI is a block cipher used in UMTS, GSM, and GPRS mobile communications systems.

New!!: Mobile security and KASUMI · See more »

Library (computing)

In computer science, a library is a collection of non-volatile resources used by computer programs, often for software development.

New!!: Mobile security and Library (computing) · See more »

Libtiff

Libtiff is a library for reading and writing Tagged Image File Format (abbreviated TIFF) files.

New!!: Mobile security and Libtiff · See more »

Linux

Linux is a family of free and open-source software operating systems built around the Linux kernel.

New!!: Mobile security and Linux · See more »

List of IEEE publications

The publications of the Institute of Electrical and Electronics Engineers publications (IEEE) constitute around 30% of the world literature in the electrical and electronics engineering and computer science fields, publishing well over 100 peer-reviewed journals.

New!!: Mobile security and List of IEEE publications · See more »

Login

In computer security, logging in (or logging on or signing in or signing on) is the process by which an individual gains access to a computer system by identifying and authenticating themselves.

New!!: Mobile security and Login · See more »

Malware

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: Mobile security and Malware · See more »

Memory protection

Memory protection is a way to control memory access rights on a computer, and is a part of most modern instruction set architectures and operating systems.

New!!: Mobile security and Memory protection · See more »

Microsoft

Microsoft Corporation (abbreviated as MS) is an American multinational technology company with headquarters in Redmond, Washington.

New!!: Mobile security and Microsoft · See more »

Microsoft Windows

Microsoft Windows is a group of several graphical operating system families, all of which are developed, marketed, and sold by Microsoft.

New!!: Mobile security and Microsoft Windows · See more »

Mobile computing

Mobile computing is human–computer interaction by which a computer is expected to be transported during normal usage, which allows for transmission of data, voice and video.

New!!: Mobile security and Mobile computing · See more »

Mobile malware

Mobile malware is malicious software that targets mobile phones or wireless-enabled Personal digital assistants (PDA), by causing the collapse of the system and loss or leakage of confidential information.

New!!: Mobile security and Mobile malware · See more »

Mobile operating system

No description.

New!!: Mobile security and Mobile operating system · See more »

Mobile secure gateway

Mobile secure gateway (MSG) is an industry term for the software or hardware appliance that provides secure communication between a mobile application and respective backend resources typically within a corporate network.

New!!: Mobile security and Mobile secure gateway · See more »

Mobile Web

The mobile web refers to browser-based Internet services accessed from handheld mobile devices, such as smartphones or feature phones, through a mobile or other wireless network.

New!!: Mobile security and Mobile Web · See more »

Morphology (biology)

Morphology is a branch of biology dealing with the study of the form and structure of organisms and their specific structural features.

New!!: Mobile security and Morphology (biology) · See more »

Multimedia Messaging Service

Multimedia Messaging Service (MMS) is a standard way to send messages that include multimedia content to and from a mobile phone over a cellular network.

New!!: Mobile security and Multimedia Messaging Service · See more »

Network monitoring

Network monitoring is the use of a system that constantly monitors a computer network for slow or failing components and that notifies the network administrator (via email, SMS or other alarms) in case of outages or other trouble.

New!!: Mobile security and Network monitoring · See more »

Operating system

An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.

New!!: Mobile security and Operating system · See more »

Palm OS

Palm OS (also known as Garnet OS) is a discontinued mobile operating system initially developed by Palm, Inc., for personal digital assistants (PDAs) in 1996.

New!!: Mobile security and Palm OS · See more »

Password cracking

In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system.

New!!: Mobile security and Password cracking · See more »

Phishing

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

New!!: Mobile security and Phishing · See more »

Phone hacking

Phone hacking is the practice of manipulating or gaining unauthorized access to mobile phones, such as by intercepting telephone calls or accessing voicemail messages.

New!!: Mobile security and Phone hacking · See more »

Pre-shared key

In cryptography, a pre-shared key (PSK) is a shared secret which was previously shared between the two parties using some secure channel before it needs to be used.

New!!: Mobile security and Pre-shared key · See more »

Privilege escalation

Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.

New!!: Mobile security and Privilege escalation · See more »

Public key certificate

In cryptography, a public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the ownership of a public key.

New!!: Mobile security and Public key certificate · See more »

Read-only memory

Read-only memory (ROM) is a type of non-volatile memory used in computers and other electronic devices.

New!!: Mobile security and Read-only memory · See more »

Resource management

In organizational studies, resource management is the efficient and effective development of an organization's resources when they are needed.

New!!: Mobile security and Resource management · See more »

Risk

Risk is the potential of gaining or losing something of value.

New!!: Mobile security and Risk · See more »

Rootkit

A root kit is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

New!!: Mobile security and Rootkit · See more »

Sandbox (computer security)

In computer security, a sandbox is a security mechanism for separating running programs, usually in an effort to mitigate system failures or software vulnerabilities from spreading.

New!!: Mobile security and Sandbox (computer security) · See more »

Security through obscurity

In security engineering, security through obscurity (or security by obscurity) is the reliance on the secrecy of the design or implementation as the main method of providing security for a system or component of a system.

New!!: Mobile security and Security through obscurity · See more »

Siemens S55

The Siemens S55 is a mobile phone which was introduced by Siemens in late 2002.

New!!: Mobile security and Siemens S55 · See more »

SIS (file format)

SIS is an acronym that stands for Software Installation Script.

New!!: Mobile security and SIS (file format) · See more »

Smartphone

A smartphone is a handheld personal computer with a mobile operating system and an integrated mobile broadband cellular network connection for voice, SMS, and Internet data communication; most, if not all, smartphones also support Wi-Fi.

New!!: Mobile security and Smartphone · See more »

SMS

SMS (short message service) is a text messaging service component of most telephone, internet, and mobile-device systems.

New!!: Mobile security and SMS · See more »

Smudge attack

A smudge attack is a method to discern the password pattern of a touchscreen device such as a cell phone or tablet computer.

New!!: Mobile security and Smudge attack · See more »

Streaming media

Streaming media is multimedia that is constantly received by and presented to an end-user while being delivered by a provider.

New!!: Mobile security and Streaming media · See more »

Subscriber identity module

A subscriber identity module or subscriber identification module (SIM), widely known as a SIM card, is an integrated circuit that is intended to securely store the international mobile subscriber identity (IMSI) number and its related key, which are used to identify and authenticate subscribers on mobile telephony devices (such as mobile phones and computers).

New!!: Mobile security and Subscriber identity module · See more »

Symbian

Symbian is a discontinued mobile operating system (OS) and computing platform designed for smartphones.

New!!: Mobile security and Symbian · See more »

Telephone call

A telephone call is a connection over a telephone network between the called party and the calling party.

New!!: Mobile security and Telephone call · See more »

Telephone tapping

Telephone tapping (also wire tapping or wiretapping in American English) is the monitoring of telephone and Internet conversations by a third party, often by covert means.

New!!: Mobile security and Telephone tapping · See more »

Temporal Key Integrity Protocol

Temporal Key Integrity Protocol or TKIP is a security protocol used in the IEEE 802.11 wireless networking standard.

New!!: Mobile security and Temporal Key Integrity Protocol · See more »

Transmission Control Protocol

The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite.

New!!: Mobile security and Transmission Control Protocol · See more »

Trojan horse (computing)

In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.

New!!: Mobile security and Trojan horse (computing) · See more »

Turing test

The Turing test, developed by Alan Turing in 1950, is a test of a machine's ability to exhibit intelligent behavior equivalent to, or indistinguishable from, that of a human.

New!!: Mobile security and Turing test · See more »

Twitter

Twitter is an online news and social networking service on which users post and interact with messages known as "tweets".

New!!: Mobile security and Twitter · See more »

University of Pennsylvania

The University of Pennsylvania (commonly known as Penn or UPenn) is a private Ivy League research university located in University City section of West Philadelphia.

New!!: Mobile security and University of Pennsylvania · See more »

Vulnerability (computing)

In computer security, a vulnerability is a weakness which can be exploited by a Threat Actor, such as an attacker, to perform unauthorized actions within a computer system.

New!!: Mobile security and Vulnerability (computing) · See more »

Wi-Fi

Wi-Fi or WiFi is technology for radio wireless local area networking of devices based on the IEEE 802.11 standards.

New!!: Mobile security and Wi-Fi · See more »

Wi-Fi Protected Access

Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks.

New!!: Mobile security and Wi-Fi Protected Access · See more »

Wired (magazine)

Wired is a monthly American magazine, published in print and online editions, that focuses on how emerging technologies affect culture, the economy, and politics.

New!!: Mobile security and Wired (magazine) · See more »

Wired Equivalent Privacy

Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks.

New!!: Mobile security and Wired Equivalent Privacy · See more »

Wireless Public Key Infrastructure

Wireless Public Key Infrastructure (WPKI) is a technology that provides public key infrastructure functionality using a mobile Secure Element such as a SIM card.

New!!: Mobile security and Wireless Public Key Infrastructure · See more »

Wireless security

Wireless security is the prevention of unauthorized access or damage to computers using wireless networks.

New!!: Mobile security and Wireless security · See more »

Zombie (computer science)

In computer science, a zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.

New!!: Mobile security and Zombie (computer science) · See more »

.NET Framework

.NET Framework (pronounced dot net) is a software framework developed by Microsoft that runs primarily on Microsoft Windows.

New!!: Mobile security and .NET Framework · See more »

3G

3G, short for third generation, is the third generation of wireless mobile telecommunications technology.

New!!: Mobile security and 3G · See more »

4G

4G is the fourth generation of broadband cellular network technology, succeeding 3G.

New!!: Mobile security and 4G · See more »

Redirects here:

Cell phone security, Mobile Security, Mobile Security Strategies, Mobile phone security, Smartphone security.

References

[1] https://en.wikipedia.org/wiki/Mobile_security

OutgoingIncoming
Hey! We are on Facebook now! »