2.5 Given a scenario, deploy mobile devices securely. Flashcards
Evaluate the statements and select the appropriate procedures to follow when implementing a mobile device security. (Select more than one)
Implement security controls on mobile devices
Enforce policies to curtail or disable the use of certain mobile device activities
Monitor certain activities associated with mobile devices
When implementing mobile device security, it is good practice to enforce policies to curtail or disable the use of certain mobile device activities that bring unwanted risk to the organization.
In implementing mobile device security, be aware of the inherent risks of allowing BYOD into the organization.
When implementing mobile device security, monitor certain activities associated with mobile devices, such as app installation from third parties, rooting/jailbreaking, carrier unlocking, and more.
When implementing mobile device security, there is a need to put security controls on mobile devices, such as screen locking, geolocation, remote wipe, device encryption, and more.
When uploading a picture to a photo web site, it automatically loads the photo onto its interactive world map. How is it possible that the website can read the location of the uploaded picture? (Select more than one)
Geolocation
GPS Tagging
GPS tagging is the process of adding geographical identification metadata, such as the latitude and longitude of where the device was located at the time, to media, such as photographs, SMS messages, video, and so on.
Geolocation is the use of network attributes to identify (or estimate) the physical position of a device.
Geofencing is the practice of creating a virtual boundary based on real-world geography.
Indoor Positioning Systems (IPS) work out a device’s location by triangulating its proximity to other radio sources, such as Wi-Fi access points or Bluetooth beacons.
What kind of access points provide a risk for Wi-Fi users? (Select more than one)
Open access
Rogue Access
The risks from Wi-Fi come from users connecting to open access points or possibly a rogue access point imitating a corporate network. These allow the access point owner to launch any number of attacks, even potentially compromising sessions with secure servers (using an SSL stripping attack, for instance).
Wi-Fi can be used to establish a Personal Area Network (PAN). Most PANs enable connectivity between a mobile device and peripherals, but ad hoc (or peer-to-peer) networks between mobile devices or between mobile devices and other computing devices can also be established.
A NearField Communications (NFC) chip allows a mobile device to make payments via contactless Point-of-Sale (PoS) machines.
What technology allows people to use their mobile device to pay for things by scanning?
NFC
Select the term that describes a widely used radio standard for wireless connectivity?
Bluetooth
What identifies the physical location of a device?
Geolocation
Evaluate the selections and differentiate between rooting and jailbreaking.
Jailbreaking refers to Apple iOS devices while rooting is refers to Android devices.
In analyzing the different ways of security control, which method requires the user to enter a code into the mobile device to gain access?
Screen lock
What is the best solution for a client who needs to set up communications in extremely remote areas?
SATCOM
Some businesses have to establish telecommunications in extremely remote areas, or in the case of military forces, use a communications system that is wholly owned and managed. Satellite communications (SATCOM) offer the best solutions to these requirements.
Geolocation is the use of network attributes to identify (or estimate) the physical position of a device.
Most devices are now fitted with Global Positioning System (GPS) chips. GPS is a means of determining a receiver’s position on the Earth (its latitude and longitude) based on information received from GPS satellites.
Indoor Positioning Systems (IPS) work out a device’s location by triangulating its proximity to other radio sources, such as Wi-Fi access points or Bluetooth beacons.
Evaluate the following mobile device deployment models and determine which answer best describes the main difference between company-issued, personally-enabled (COPE) and choose your own device (CYOD).
In using CYOD, the employee can select the device from a list of approved mobile devices.
The difference between CYOD (Choose Your Own Device) and COPE is that CYOD (Corporate Owned, Personally-Enabled) allows the employee to select a device from a list provided by the company.
COPE refers to a device that is chosen and supplied by the company and remains its property. The employee may use it to access personal email, social media accounts, and for personal web browsing (subject to the company’s acceptable use policies).
CYOD and COPE are company-owned devices, but they can be used for personal email and social media.
CYOD and COPE are company provided mobile devices, not personally owned.
A company provides mobile phones for their employees for business use only. What type of deployment model must the company provide their employees with a mobile device?
COBO
COBO (Corporate Owned, Business Only) device is the property of the company and may only be used for company business.
BYOD (Bring Your Own Device) is when the mobile device is owned by the employee. The employee will have to agree on the installation of corporate apps and to some level of oversight and auditing.
COPE (Corporate Owned, Personally-Enabled) is a device that is chosen and supplied by the company, but the employee can use it to access personal email, social media accounts, and for personal web browsing.
CYOD (Choose Your Own Device) is much the same as COPE, but the employee is given a choice of device from a list.
What is a push notification?
Store services that an app or website can use to display an alert on a mobile device.
Push notifications are store services (such as Apple Push Notification Service and Google Cloud to Device Messaging) that an app or website can use to display an alert on a mobile device.
The radio firmware in a mobile device contains an operating system that is separate from the end-user operating system (for example, Android or iOS).
GPS tagging is the process of adding geographical identification metadata, such as the latitude and longitude where the device was located at the time, to media such as photographs, SMS messages, and video.
A content management system tags corporate or confidential data and prevents it from being shared or copied to unauthorized media or channels, such as non-corporate email systems or cloud storage services.
When deploying satellite communications (SATCOM), what should a business assess?
Service providers
The need to assess service providers is important, to ensure that the provider has vulnerability management procedures for receivers and handsets, and that the communications links use secure encryption.
The USB ports are not involved in the SATCOM, therefore, it is not necessary to assess those.
Geofencing is the practice of creating a virtual boundary based on real-world geography. Geofencing can be a useful tool with respect to controlling the use of camera or video functions.
The radio firmware is in a mobile device and contains an operating system that is separate from the end-user operating system.
Analyze the following scenarios to determine which best represent attacks that Nearfield Communications (NFC) are vulnerable to. (Select more than one)
An attacker with a reader can skim information from the NFC device.
Certain antenna configurations may pick up the Radio Frequency (RF) signals.
An attacker may be able to corrupt data being transferred.
Certain antenna configurations may be able to pick up the Radio Frequency (RF) signals emitted by NFC from several feet away, giving an attacker the ability to eavesdrop from a more comfortable distance.
An attacker with a reader will be able to skim information from an NFC device in a crowded area, such as a busy train.
An attacker may be able to corrupt data as it is being transferred through a method like a Denial-of-Service (DoS) attack. This type of attack floods the area with an excess of RF signals to interrupt the transfer.
The wallet app does not transmit the original credit card information, rather a one-time token that is interpreted by the card merchant and linked backed to the relevant customer account.
Evaluate the methods of obtaining privilege escalation on mobile devices and conclude which is an example of jailbreaking.
A user boots the device with a patched kernel while the device is attached to a computer.
Jailbreaking is popular for iOS devices as they are more restrictive than Android. This gives users the ability to obtain root privileges, sideload apps, change or add carriers and customize the interface. It is accomplished by booting the device with a patched kernel and can be done when the device is attached to a computer when it boots.
Rooting is a term associated with Android devices. One method of rooting is to exploit a vulnerability.
Carrier unlocking is used for both iOS and Android and is a means of removing the restrictions that lock a device to a single carrier.
Custom firmware can also be used for rooting Android devices.