3.5 Given a scenario, implement secure mobile solutions.3.6 Given a scenario, apply cybersecurity solutions to the cloud. Flashcards
What features of Airwatch can benefit a company?
Full drive encryption, containerization, application management
CYOD
This is a policy used by organizations that allows employees to choose their own devices for work purposes, from a list of approved options. It’s a strategy that sits between “Bring Your Own Device” (BYOD) and standard issue corporate devices.
BYOD
It’s a policy used by organizations where the company owns the devices (like smartphones, tablets, laptops) but allows employees to use them for personal reasons as well. This approach gives the organization more control over the device, ensuring security and compliance, while still offering flexibility to the employee.
COPE
“COPE” stands for “Corporate-Owned, Personally-Enabled.” It’s a policy used by organizations where the company owns the devices (like smartphones, tablets, laptops) but allows employees to use them for personal reasons as well. This approach gives the organization more control over the device, ensuring security and compliance, while still offering flexibility to the employee.
CASB
A Cloud Access Security Broker (CASB) is a part of security as a service that monitors network traffic between a company’s network and cloud provider, enforcing security policies.
Iaas
Infrastructure as a Service, (IaaS) allows for the outsourcing of equipment and support operations. The service provider owns, maintains, and manages the equipment.
Attestation
Attestation is the process of checking and validating system files during a boot process.
Regional Replication
Regional replication (also called zone-redundant storage) replicates your data across multiple data centers within one or two regions.
NSWG
Next-generation secure web gateway (SWG) is a modern implementation of content filters that also performs threat analysis and other integrated services like data loss prevention (DLP).
What security issues can occur when using a Bluetooth device?
Authentication and authorization occur when devices authenticate using a simple passkey configured on both devices.
Device discovery occurs when a device can be put into discoverable mode, meaning that it will connect to any other Bluetooth devices nearby, which can pose a security issue.
Malware occurs when there are proof-of-concept Bluetooth worms and application exploits, which can compromise any active and unpatched system, regardless of whether discovery is enabled and without requiring any user intervention.
How do you jailbreak a device?
A user boots the device with a patched kernel while the device is attached to a computer.
Firewall filterting at layer 3
Firewall filtering at layer 3 of the Open Systems Interconnection (OSI) model can isolate communication between the on-site backup solution and the cloud storage service via IP address. This prevents other services or external threats from access the cloud resource.
Network location
A network location identifies a user or device based on an IP address, subnet, virtual LAN (VLAN), or organizational unit (OU). This can be used as an account restriction mechanism.
geolocation
A geolocation can be determined by IP addresses provided by an Internet Service Provider (ISP) which are linked to geographical areas. Global positioning system (GPS) sensors can also determine geolocation.
geotagging
Geotagging refers to the addition of location metadata to files or devices. This is often used for asset management.