2.8 2.8 Given a scenario, implement methods for securing mobile devices. Flashcards
2.8 Given a scenario, implement methods for securing mobile devices.
2.8 Given a scenario, implement methods for securing mobile devices.
• Screen locks
Screen locks • Restrict access to the device • You’re going to leave it somewhere.
- Failed attempts
- iOS: Erase everything after 10 failed attempts
• Android: Lock the device and require a Google login
- Fingerprint lock
Settings>display>screen lock > fingerprnt
A device, usually integrated into a mobile device, that reads the user’s fingerprint to determine whether to grant access to the device.
- Face lock
•Settings>display>screen lock > face recognition.
- Swipe lock
Swipe lock- Settings>display>screen lock >
- Passcode lock
Settings>display>screen lock >Enter passcode twice>ok.
• Remote wipes
Locator applications and remote wipe • Built-in GPS • And location “helpers” • Find your phone on a map
- Control from afar • Make a sound • Display a message
- Wipe everything • At least your data is safe
• Locator applications
Locator applications and remote wipe • Built-in GPS • And location “helpers” • Find your phone on a map
- Control from afar • Make a sound • Display a message
- Wipe everything • At least your data is safe
• Remote backup applications
- Difficult to backup something that’s always moving • Backup to the cloud
- Constant backup - No manual process
- Backup without wires - Use the existing network • Restore with one click
- Restores everything • Authenticate and wait
• Failed login attempts restrictions
- iOS: Erase everything after 10 failed attempts
* Android: Lock the device and require a Google login
• Antivirus/Anti-malware
- Apple iOS • Closed environment, tightly regulated • Malware has to find a vulnerability
- Android • More open, apps can be installed from anywhere • Easier for malware to find its way in
- Windows Phone • Closed environment • Apps run in a “sandbox” • You control what data an app can view
• Patching/OS updates
Patching/OS updates • All devices need updates - Even mobile devices
- Device patches - Security updates • Operating system updates - New features, bug fixes
- Don’t get behind! - Avoid security problems
• Biometric authentication
- Fingerprint, face, iris • A phone is always with you • And you’re a good source of data
- Biometrics have a long way to go •
• Full device encryption
- Encrypt all device data • Phone keeps the key
- iOS 8 and later • Personal data is encrypted with your passcode
- Android - Full device encryption can be turned on
• Multifactor authentication
- More than one factor • Passcode, password, swipe pattern • Fingerprint, face, iris • A phone is always with you • And you’re a good source of data
- We’re just figuring this out • Biometrics have a long way to go
- Biometric authentication • Multi-factor authentication