3.5 Implement secure mobile solutions Flashcards
Mobile device mgt: what is MDM ?
Mobile Device Management is used to centralized management of the mobile devices
Mobile device mgt: why MDM is important ?
For security (data, network)
Mobile device mgt: what is BYOD in MDM ?
Bring Your Own Device
Mobile device mgt: how MDM ensure devices are protected ?
By setting up policies on apps, data, camera etc. The admin can control the remote device and manages access control (force scren locks & PIN on a device)
Mobile device mgt: what can you manage if you use an MDM ?
- Application mgt
- Content mgt
- Remote wipe
- Geolocation
- Geofencing
- Screen lock
- Push notification services
- Passwords & PIN (reset)
- Biometrics (type, allow/ disallow)
- Context-aware authentication
- Containerization
- FDE
Mobile device mgt: why is content mgt is important ?
It aims at secure access to data and protect them from outsiders.
Ex: restrict file sharing and viewing, set up DLP, encrypt data
Mobile device mgt: what is remote wipe functionnality ?
Remove all data from a mobile device (in case of lost/stolen for ex)
Mobile device mgt: what is geofencing ?
Restrict or allow features when the device is in a particular area (for ex camera, auth
Mobile device mgt: what is push notification services and why is included in MDM?
Notification that appears on the mobile device screen.
Notification display can be controlled in the MDM
Mobile device mgt: what is context-aware authentication?
Combine multiple contexts (IP location, GPS location etc) to know if it’s really you trying to auth or if it’s a hacker
Mobile device mgt: what is containerization in MDM ?
Create separate partitions to keep private information in one partition and company information in another
Mobile device mgt: what is FDE in MDM and what is the problem w/ FDE?
Full Device Encryption
It use a lot of CPU cycles + complex integration between hardware and software
Mobile device security: what is a HSM?
Hardware Security Module provides cryptographic features for computer and mobile devices (in a microSD HSM)
Mobile device security: what does a microSD HSM (& HSM) provide?
Security services & secure storage:
- Encryption
- Key generation
- Digital signatures
- Authentication
- Protect private keys
- Cryptocurrency storage
Mobile device security: what is a UEM ?
Unified Endpoint Management is an evolution of MDM allowing the users to use different types of devices
Ex: application can be used across != platforms
Mobile device security: what is a MAM ?
Mobile Application Management is used to provision, update, and remove apps
Ex: apps catalog, monitoring of apps use etc
Mobile device security: what is a SEAndroid ?
Security Enhancements for Androids supports access control security policies and use the SELinux in Android OS
Ex: protect access to kernel
Mobile device enforcement: what is rooting/ jailbreaking?
Jailbreaking or rooting means removing software restrictions that are intentionally put in place by the device manufacturer.
Android = rooting
iOS = jailbreaking
Mobile device enforcement: how to rooting/ jailbreaking?
By installing a custom firmware that replaces the existing OS with one that allow you access to the OS itself
Mobile device enforcement: why the staff do rooting/ jailbreaking?
- Circumvent security features, sideload apps without using an app store
- To be able install certains apps that are not allowed by the company
Mobile device enforcement: can MDM manage camera and microphone recording?
Yes it can disable it
Mobile device enforcement: can MDM manage SMS/MMS ?
Yes it can disable it completely or disable it in certain area
Mobile device enforcement: what is USB OTG ?
USB On-The-Go connect mobile directly together The mobile device can be both a host and a device and can be use to read from an external device, act as a storage device
Mobile deployment models: what are the != deployment models ?
- BYOD
- COPE
- CYOD
- Corporate owned (device cannot be used for personnal use)
- VDI/VMI
Mobile deployment models: what is COPE ?
Corporate owned, personally enabled: company buys the device and users used as both a corporate device and personal device
Mobile deployment models: what is CYOD ?
Choose Your Own Device: the user choose the device and the corporate buy it for you
Mobile deployment models: what is VDI/ VMI ?
Virtual Desktop Infrastructure / Virtual Mobile Infrastructure: the apps & data are separated from the mobile device