2.7 Mobile Device Security Flashcards

Explain common methods for securing mobile and embedded devices

1
Q

What is the highest level of encryption available for mobile Wi-Fi at this time?

A

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What settings must a firewall have to successfully protect a mobile device?

A

Root or administrative privileges on the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give a better option for connecting to the internet securely than a firewall

A

VPN connection between the mobile device and a centralised server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Should the mobile firewall be implemented before or after securing wireless connectivity?

A

After

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List 5 options for unlocking a mobile device

A
  • PIN
  • Password
  • Pattern
  • Fingerprint
  • ID
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How many possible codes are there for a 4-digit PIN?

A

10,000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What attacks are PINs susceptible to?

A

Shoulder surfing attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Contrast PINs and passwords

A

PINs only have numbers whereas passwords can have letters and symbols also

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe how a remote wipe could work

A

Deletes all data after 10 failed login attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Give the fail rate of touch ID

A

1 in every 50,000 attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Give the fail rate of face ID

A

1 in every million attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List 4 best practices for protecting against mobile malware

A
  • Don’t jailbreak/root device
  • Don’t use custom firmware/ROM
  • Only load official store apps
  • Always update software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does TLS for mobiles work?

A

By utilising an encryption layer and a tunnel between the device and the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why would you use TLS for mobile?

A

To ensure confidentiality of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name one category of apps that relies on TLS

A

Social networking apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Geotagging

A

Embedding of the geolocation coordinates into a piece of data e.g. a photo

17
Q

What is the most secure, restrictive and expensive mobile deployment option?

A

COBO

18
Q

Describe COBO

A

Purchased by the company and only used by the employee for work-related purposes

19
Q

COPE

A

Company provides a device used for work and/or personal use by employees

20
Q

CYOD

A

Allows employees to choose device from an approved list of vendors or devices

21
Q

BYOD

A

Employees bring their own devices and connect to the corporate network

22
Q

Which mobile device deployment option is the most difficult to secure?

A

BYOD

23
Q

Storage segmentation

A

Isolation of company apps and data from user apps and data

24
Q

List ten steps to make mobile devices more secure

A
  1. Update your device to the latest software
  2. Install Antivirus
  3. Train users on proper security and use of their device
  4. Only install apps from the official app stores
  5. Do not jailbreak or root your devices
  6. Only use Version 2 SIM cards for your devices
  7. Turn off all unnecessary features on your device
  8. Turn on encryption for voice and data
  9. Use strong passwords or biometrics
  10. Don’t allow BYOD
25
Q

What OS do most IoT devices use?

A

An embedded version of Linux or Android

26
Q

Give 3 IoT vulnerabilities

A
  • Insecure defaults
  • Hard-coded configurations
  • Cleartext communication
27
Q

What is a risk in using IoT devices?

A

Manufacturers often use outdated or insecure hardware components

28
Q

Why is Bluetooth communication between IoT devices risky?

A

Because attackers can monitor frequencies and may be able to eavesdrop

29
Q

What can exploits cause IoT devices to do?

A

Go offline, crash, or malfunction

30
Q
A