**What does IoC stand for?**
IoC stands for *Indicators of Compromise.*
**What are Indicators of Compromise (IoCs)?**
IoCs are *pieces of forensic data, such as system log entries or files, that suggest a mobile device may have been compromised.*
**What are Indicators of Compromise (IoCs) used for in cybersecurity?**
In cybersecurity, IoCs are used *to detect potential security breaches, malware infections, or other threats.*
# Common IoCs in Mobile Security
| Symptom | How can it be an IoC? |
| --------------------------------- | ---------------------------------------------- |
| Unusual outbound network traffic. | Malware communicating with external servers. |
| Unexpected SMS or calls. | A breach or malware activity. |
| Unusual battery drain. | Malicious processes running in the background. |
| Suspicious app installation. | Malware installation. |
| Changes in system settings. | Unauthorized access. |
| Increased data usage. | Background activities by malicious software. |
| Performance issues. | Malware or spyware running in the background. |
| Security software tampering. | Attacker trying to evade detection. |
# Importance
**What do Indicators of Compromise (IoCs) help with and what does it enable?**
IoCs help with *the early detection of security incidents and enables quicker response to mitigate potential damage.*
**Is regular monitoring of Indicators of Compromise (IoC) critical to mobile security?**
*Yes*, regular monitoring of IoCs is critical to mobile security.
# Challenges
**What does the detection of Indicators of Compromise (IoC) require?**
The detection of IoCs requires *constant vigilance and regular system checks.*
**What might sophisticated attacks use to make Indicators of Compromise (IoCs) harder to detect?**
Sophisticated attacks might use *techniques to hide their presence* to make IoCs harder to detect.