2.8 2.8 Given a scenario, implement methods for securing mobile devices. Flashcards

1
Q

2.8 Given a scenario, implement methods for securing mobile devices.

A

2.8 Given a scenario, implement methods for securing mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

• Screen locks

A

Screen locks • Restrict access to the device • You’re going to leave it somewhere.

  • Failed attempts
  • iOS: Erase everything after 10 failed attempts

• Android: Lock the device and require a Google login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • Fingerprint lock
A

Settings>display>screen lock > fingerprnt

A device, usually integrated into a mobile device, that reads the user’s fingerprint to determine whether to grant access to the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Face lock
A

•Settings>display>screen lock > face recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • Swipe lock
A

Swipe lock- Settings>display>screen lock >

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Passcode lock
A

Settings>display>screen lock >Enter passcode twice>ok.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

• Remote wipes

A

Locator applications and remote wipe • Built-in GPS • And location “helpers” • Find your phone on a map

  • Control from afar • Make a sound • Display a message
  • Wipe everything • At least your data is safe
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

• Locator applications

A

Locator applications and remote wipe • Built-in GPS • And location “helpers” • Find your phone on a map

  • Control from afar • Make a sound • Display a message
  • Wipe everything • At least your data is safe
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

• Remote backup applications

A
  • Difficult to backup something that’s always moving • Backup to the cloud
  • Constant backup - No manual process
  • Backup without wires - Use the existing network • Restore with one click
  • Restores everything • Authenticate and wait
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

• Failed login attempts restrictions

A
  • iOS: Erase everything after 10 failed attempts

* Android: Lock the device and require a Google login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

• Antivirus/Anti-malware

A
  • Apple iOS • Closed environment, tightly regulated • Malware has to find a vulnerability
  • Android • More open, apps can be installed from anywhere • Easier for malware to find its way in
  • Windows Phone • Closed environment • Apps run in a “sandbox” • You control what data an app can view
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

• Patching/OS updates

A

Patching/OS updates • All devices need updates - Even mobile devices

  • Device patches - Security updates • Operating system updates - New features, bug fixes
  • Don’t get behind! - Avoid security problems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

• Biometric authentication

A
  • Fingerprint, face, iris • A phone is always with you • And you’re a good source of data
  • Biometrics have a long way to go •
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

• Full device encryption

A
  • Encrypt all device data • Phone keeps the key
  • iOS 8 and later • Personal data is encrypted with your passcode
  • Android - Full device encryption can be turned on
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

• Multifactor authentication

A
  • More than one factor • Passcode, password, swipe pattern • Fingerprint, face, iris • A phone is always with you • And you’re a good source of data
  • We’re just figuring this out • Biometrics have a long way to go
  • Biometric authentication • Multi-factor authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

• Authenticator applications

A

Authenticator apps • Pseudo-random token generators • A useful authentication factor

  • Carry around physical token devices • Where are my keys again?
  • You’re carrying your phone around • And it’s pretty powerful
17
Q

• Trusted sources vs. untrusted sources

A
  • Once malware is on a phone, it has a huge amount of access
  • Don’t install Android Apps (APK files) from an untrusted source
  • Android • Apps can be downloaded from • Google Play or sideloaded • This is where problems can occur
  • iOS • All apps are curated by Apple
18
Q

• Firewalls

A

Firewalls • Mobile phones don’t include a firewall • Most activity is outbound, not inbound

  • Some mobile firewall apps are available • Most for Android
  • None seem to be widely used • Enterprise environments can control mobile apps
  • Firewalls can allow or disallow access
19
Q

• Policies and procedures

FOR HW- BYOD vs. corporate-owned

A
  • Manage company-owned and user-owned mobile devices • BYOD - Bring Your Own Device
  • Centralized management of the mobile devices • Specialized functionality
  • Set policies on apps, data, camera, etc. • Control the remote device • The entire device or a “partition”
  • Manage access control • Force screen locks and PINs on these single user devices
20
Q

• Policies and procedures

FOR - User Profile security requirements

A
  • Manage access control • Force screen locks and PINs on these single user devices *Biometric authentication
  • Multi-factor authentication • More than one factor • Passcode, password, swipe pattern
  • Fingerprint, face, iris