3.5 - Mobile Security Flashcards
What is a point-to-point connection?
A one-to-one connection. Typically, this is connection between buildings. Wi-Fi repeaters are an example.
It is a conversation between two devices.
What is a point-to-multipoint?
The access point connects to multiple devices. This is the most common form under the 802.11.
What are some security concerns with cellular networks?
1) Traffic Monitoring
2) Location Tracking
3) Worldwide access to a mobile device
What are some security concerns with Wi-Fi networks?
1) Data capture
2) On-path attack
3) DOS (frequency interference)
What are several types of mobile networks?
1) Bluetooth
2) Cellular
3) RFID (Radio-Frequency Identification)
4) Wi-Fi
5) NFC (Near Field Communication)
6) IR (Infrared)
7) USB
8) GPS
How does RFID work?
Radar
What are the security concerns with NFC?
1) Remote Capture
2) Frequency jamming
3) Relay / Replay attack
4) Loss of RFC device control
What is a large security concern with IR (infrared)?
Other IR devices can control your IR device.
What is MCM?
Mobile Content Management
Used to secure access to data and to protect data from outsiders on mobile devices.
What is DLP?
Data Loss Prevention
To prevent the loss of sensitive data.
How can you delete everything on a mobile device?
Remote Wipe in MDM.
What is MDM?
Mobile Device Management
Allows you to manage company-owned and user-owned mobile devices
What is Geofencing?
Restricting or allowing features when the device is in a particular area.
For authentication, you can allow only logins from a certain location or country.
What can you manage with MDM?
1) Geofencing
2) Geolocation
3) Screen lock (how many attempts?)
4) Remote Wipe
5) Push notification services
6) Passwords and Pins
7) Biometrics (can be per device or per application)
8) Full device encryption (how much vs. battery life
and CPU)
What is context-aware authentication?
Authentication that depends on contexts like: normal IP address, GPS information, Bluetooth devices, etc.