**What does IoC stand for?** IoC stands for *Indicators of Compromise.* **What are Indicators of Compromise (IoCs)?** IoCs are *pieces of forensic data, such as system log entries or files, that suggest a mobile device may have been compromised.* **What are Indicators of Compromise (IoCs) used for in cybersecurity?** In cybersecurity, IoCs are used *to detect potential security breaches, malware infections, or other threats.* # Common IoCs in Mobile Security | Symptom | How can it be an IoC? | | --------------------------------- | ---------------------------------------------- | | Unusual outbound network traffic. | Malware communicating with external servers. | | Unexpected SMS or calls. | A breach or malware activity. | | Unusual battery drain. | Malicious processes running in the background. | | Suspicious app installation. | Malware installation. | | Changes in system settings. | Unauthorized access. | | Increased data usage. | Background activities by malicious software. | | Performance issues. | Malware or spyware running in the background. | | Security software tampering. | Attacker trying to evade detection. | # Importance **What do Indicators of Compromise (IoCs) help with and what does it enable?** IoCs help with *the early detection of security incidents and enables quicker response to mitigate potential damage.* **Is regular monitoring of Indicators of Compromise (IoC) critical to mobile security?** *Yes*, regular monitoring of IoCs is critical to mobile security. # Challenges **What does the detection of Indicators of Compromise (IoC) require?** The detection of IoCs requires *constant vigilance and regular system checks.* **What might sophisticated attacks use to make Indicators of Compromise (IoCs) harder to detect?** Sophisticated attacks might use *techniques to hide their presence* to make IoCs harder to detect.