3.5 Flashcards
Cellular
One of the strengths of cellular is that robust nationwide networks have been deployed, making strong signals available virtually anywhere with reasonable population density. The corresponding weakness is that gaps in cellular service still exist in remote areas.
Wi-Fi
These systems exist on 2.4- and 5-GHz frequency spectrums, and networks are constructed by both the enterprise you are associated with and third parties. This communication methodology is ubiquitous with computing platforms and is relatively easy to implement and secure.
Bluetooth
Bluetooth is a short-to-medium range, low-power wireless protocol that transmits in the 2.4-GHz band, which is the same band used for 802.11.
The Bluetooth’s protocol advertisement of services and pairing properties is where some of the security issues start. Bluetooth should always have discoverable mode turned off unless you’re deliberately pairing a device.
NFC
Near field communication (NFC) is a set of wireless technologies that enables smartphones and other devices to establish radio communication when they are within close proximity to each other—typically a distance of 10 cm (3.9 in) or less.
Currently, NFC relies to a great degree on its very short range for security, although apps that use it have their own security mechanisms as well.
Infrared
Infrared (IR) is a band of electromagnetic energy just beyond the red end of the visible color spectrum.
IR cannot penetrate walls but instead bounces off them. Nor can it penetrate other solid objects; therefore, if you stack a few items in front of the transceiver, the signal is lost. Because IR can be seen by all in range, any desired security must be on top of the base transmission mechanism.
USB
Universal Serial Bus (USB) has become the ubiquitous standard for connecting devices with cables.
USB drive keys, which are basically flash memory with a USB interface in a device typically about the size of your thumb, provide a way to move files easily from computer to computer. When plugged into a USB port, these devices automount and behave like any other drive attached to the computer. Their small size and relatively large capacity, coupled with instant read-write capability, present security problems. They can easily be used by an individual with malicious intent to conceal the removal of files or data from the building or to bring malicious files into the building and onto the company network.
Point-to-Point
Point-to-point communications are defined as communications with one endpoint on each end—a single transmitter talking to a single receiver. This terminology transferred to networking, where a communications channel between two entities in isolation is referred to as point-to-point.
Point-to-Multipoint
Point-to-multipoint communications have multiple receivers for a transmitted signal. When a message is sent in broadcast mode, it has multiple receivers and is called a point-to-multipoint communication.
Remember that a point-to-point connection is between two devices (one to one) while point-to-multipoint connections are one (device) to many (devices)
RFID
RFID tags are used as a means of identification and have the advantage over bar codes that they do not have to be visible, just within radio wave range—typically centimeters to 200 meters, depending on tag type. RFID tags are used in a range of security situations, including contactless identification systems such as smart cards.
Several different attack types can be performed against RFID systems. The first is against the RFID devices themselves—the chips and readers. A second form of attack goes against the communication channel between the device and the reader. The third category of attack is against the reader and back-end system. This last type is more of a standard IT/IS attack, depending on the interfaces used (web, database, and so on) and therefore is not covered any further.
Mobile Device Management (MDM)
Mobile Device Management (MDM) sets policies for the installation and protection of mobile devices.
Application Management
Application management uses whitelists to control which applications are allowed to be installed onto the mobile device.
Content Management
Content management stores business data in a secure area of the device in an encrypted format to protect it against attacks. It prevents confidential or business data from being shared with external users.
Remote Wipe
When a mobile device has been lost or stolen, it can be remotely wiped. The device will revert to its factory settings and the data will no longer be available.
Geofencing
Geofencing uses the Global Positioning System (GPS) or RFID to define geographical boundaries. Once the device is taken past the defined boundaries, the security team will be alerted.
Geolocation
Geolocation uses GPS to give the actual location of a mobile device. This is used when you lose your iPad and then you use your iPhone to determine its location.
Context-aware authentication
Context-aware security is location-based. It checks the country from where the authentication request is being made. This is extremely important if you are using a zero-trust model.
Mary, a financial director based in London, is using context-aware authentication. For the authentication to be successful, the user must be Mary, the time has to be between 9 a.m. and 5 p.m., Monday to Friday, and she needs to be in London. If not all of these criteria are met, then authentication fails.