3.5 Securing Mobile Devices Flashcards
Define context-aware authentication
Using other information, such as location, proximity to other devices, in addition to multi-factor authentication to determine if the user is valid
Define Containerization, relative to mobile device security (2)
- With BYOD, user’s personal data needs to separated from company data
- Containerization is the concept of dividing this data and providing the capability to remove company data without affecting personal data
Define storage segmentation relative to mobile devices
An implementation of containerization where company data is stored separately from personal data on the device
Define MicroSD HSM
Implementation of hardware security module on mobile devices provides hardware-based cryptographic functions
Define MDM/UEM
Mobile Device Management/Unified Endpoint Management allows centralized management of security for all mobile devices within an organization
Define Mobile Application Management (MAM)
allows management of and access to applications that are allowed to run on company mobile devices
Define SEAndroid
Security enhancements for Android OS provides additional access controls and security policies for Android-based mobile devices
Implementing third-party application security on mobile devices (2)
- MDM/UEM can utilized to allow/disallow certain apps from running on the device
- Even though an AppStore is provided for mobile apps, not every app is desirable or secure enough to allow
Define concerns of rooting/jailbreaking mobile devices
A rooted/jailbroken (firmware) mobile device cannot be managed by MDM and allows sideloading of apps. Ensure all mobile devices are using the standard firmware for the OS
Define USB OTG
USB On-the-Go, ability to transfer data from other devices to a mobile device via USB cable connection