2.3 Mobile and Small Form Factor Devices Flashcards

Analyze scenario to integrate security controls for mobile and small form factor devices to meet security requirements

1
Q

(Enterprise Mobility Management)

A

Centralized approach to management provides a consistent and comprehensive way of locking down devices to meet security polisies and compliance requirements while still allowing users to be productive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(Enterprise Mobility Management)

containerization

A

isolates corporate data into protected and encrypted container stored on the mobile device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(Enterprise Mobility Management)

Configuration profiles and payloads

A
  • Configuration profiles are groups of OS and application setting applieed to various devices inside and outside of an enterprise
  • Payloads are the individual settings in the configuration profiles
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(Enterprise Mobility Management)

POCE

A

Personally Owned, Corporate Enabled

-BYOD but with official enterprise onboarding requirements to ensure the device is properly managed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(Enterprise Mobility Management)

Application Wrapping

A

additional sedurity features added to a mobile appplication that do not modify the underlying functionality of the application itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(Enterprise Mobility Management)

Remote assistance access

A

permits helpers to access the user;s device screen, observe settings, and monitor performance, intsall or remove applications, set up email, and configure VPN or wifi services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(Enterprise Mobility Management)

VNC

A

Graphical desktop sharing tool that permits remote management of other devices.
-Uses Remote Frame Buffer (RFB) protocol for remote assistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(Enterprise Mobility Management)

MDM

A

Mobile device management
-often have the ability to create application configuration policies that may permit deployment of applications to include custom configurations and security options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(Enterprise Mobility Management)

Over-the-air Updates

A

centralized and wireless distribution of new software, firmware, certificates, and encryption keys to mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(Enterprise Mobility Management)

Remote Wiping

A

process of sending a signal to a remote device to erase specified data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(Enterprise Mobility Management)

SCEP

A

Simple Certificate Enrollment Protocol

-provides an easy process for network equipment, software, and mobile devices to enroll in digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(Enterprise Mobility Management)

BYOD

A

Bring Your Own Device
-allows employees to bring in their own personal devices such as laptops, smartphones, and tablets to work in order to access enterprise applications and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(Enterprise Mobility Management)

COPE

A

Corporate Owned, Personally Enabled

-company purchases and owns the device and lets employees use them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(Enterprise Mobility Management)

VPN

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(Enterprise Mobility Management)

Application Permissions

A

applications require permissions to use cameras, microphones, call logs, email, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(Enterprise Mobility Management)

Side Loading

A

process of installing applications from sources outside of the app store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

(Enterprise Mobility Management)

unsigned apps/system apps

A

Official apps are digitally singed for their legitimacy by the application developer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

(Enterprise Mobility Management)

context-aware management

A

applies restrictive policies to mobile devices based on certain device conditions like location or time of day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

(Enterprise Mobility Management)

Context Aware management - Geolocation

A

process of determining a devices location by using GPS devices or cell towers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

(Enterprise Mobility Management)

Context- aware management - User behavior

A

can detect when a user’s behavior on a device deviates from a norm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

(Enterprise Mobility Management)

Context-aware management - time based restrictions

A

applies certain security controls on a device based on the time of day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

(Security implications/privacy concerns)

Removable storage

A

built into mobile devices such as smartphones and tablets and cannot be removed

23
Q

(Security implications/privacy concerns)

cloud storage

A

used for backing up a mobile device settings, application data, photos, and videos, purchase history

24
Q

(Security implications/privacy concerns)

Transfer/Data Storage

A

free cloud services provide basic services such as free storage, file management recycle bin, content sharing but does not allow much control over the actual storage

25
(Security implications/privacy concerns) | USB OTG
USB devices to 'host' other USB devices
26
(Security implications/privacy concerns) | Device loss/theft
mobile devices are prone to theft or being forgotten
27
(Security implications/privacy concerns) | Harward andti-tamper
resist deliberate attempts at cousing disruption to or malfunction of a device
28
(Security implications/privacy concerns) | eFuse
supports reprogramming of a computer chip's programming if adverse conditions, such as tampering, are detected.
29
(Security implications/privacy concerns) | TPM
Trusted Platform Module -built into most motherboards to generate and store encryption keys in order to provide root of trust capabilities for devices using encrypted hard drives
30
(Security implications/privacy concerns) | Rooting
grants root-level privileges to android OS
31
(Security implications/privacy concerns) | Jailbreaking
the process of removing certain security restrictions from iOS devices such as iPhones and iPads
32
(Security implications/privacy concerns) | Push notification services
important messages sent to mobile devices by an application publisher or an enterprise MDM
33
(Security implications/privacy concerns) | Geotagging
proccess of attaching geographically related information to common media types such as pictures, videos, SMS messages, and even websites
34
(Security implications/privacy concerns) | Encrypted instant messaging apps
instant messaging applications can be encrypted to protect from packet sniffers
35
(Security implications/privacy concerns) | tokenization
the process of using a non-sensitive value (token) as a substitute for the original sensitive value (credit card number)
36
(Security implications/privacy concerns) | OEM/carrier android fragmentation
the wide disparity of android versions still in use due to older android devices being prevented by google from updating to the latest android version
37
(Security implications/privacy concerns) | Mobile Payment
using smartphones and smart watches to submit mobile payments via their mobile devices payment appications
38
(Security implications/privacy concerns) | inductance-enabled
NFC antennas use inductance by a wrapped coil of to generate a very small magnetic field. This can create a connection between two devices
39
(Security implications/privacy concerns) | mobile wallet
virtual wallets that store payment card information on mobile devices
40
(Security implications/privacy concerns) | peripheral-enabled payments
involve attaching credit card readers to smartphones in order to process credit cards
41
(Security implications/privacy concerns) | Tethering
process of sharing a wireless connection to other devices via the wifi, USB, or bluetooth protocol
42
(Security implications/privacy concerns) | authentication
mobile devices have multiple authentication methods to choose from including - swipe pattern - gesture - pin code - biometrics
43
(Security implications/privacy concerns) | Malware
mobile devices are inherently more resistant to malware that PCs since mobile OSs place users behind restricted sandboxes
44
(Security implications/privacy concerns) | Unauthorized domain bridging
when unauthorized wi-fi users connect through the dual-network-connected employee to reach the corporate wired network.
45
(Security implications/privacy concerns) | baseband radio/SOC
hybrid CPU/RAM/firmware chip on mobile devices that handles its cellular radio connections
46
(Security implications/privacy concerns) | Augmented reality
enhances or augments your real world by adding auditory, visual, haptic, and other digital sensory elements so that it feels like new environmental elements have been physically added into your current space.
47
(Security implications/privacy concerns) | SMS/MMS/messaging
SMS/MMS messages are generally unencrypted
48
(Wearable Technology) | Devices
- cameras - watches - fitness devices - medical sensors/devices - headsets
49
(Wearable Technology) | Encrypted and unencrypted communications concerns
minimize/stop the use of wearables if it does not support encrypted communications
50
(Wearable Technology) | physical reconnaissance
when attacker use wearable technology to gather information about an environment or its people
51
(Wearable Technology) | Personal data theft
when attackers remotely pair with a device and extract its data
52
(Wearable Technology) | health privacy
fitness devices, particularly medical devices, can generate, store, and transmit electronic health information about their owners
53
(Wearable Technology) | Data forensics of collected data
practice of collecting, preserving, and analyzing digital evidence in order to understand all aspects of a digital crime