6.2 Application Security Flashcards
*
Mobile, embedded, and IoT devices are_____________; security programs should include them.
*
prevalent and vulnerable
Compromised devices can lead to consequences ranging from ____________ to ______________
embarrassing to fatal.
*
Mobile devices are increasingly vulnerable due to (4)?
*
powerful hardware, constant network connectivity, and movement between environments.
__________ _____________ include smartphones, tablets, head-mounted devices, and smartwatches, performing similar functions to non-mobile computers.
Mobile devices
*
The line between __________ and ____________has blurred, with some smartphones rivaling computer power and some computers running mobile operating systems.
mobile devices and computers
*
Businesses typically use__________ and _____________ to maintain mobile device security.
software and policies
*
__________________solutions allow central control of devices, including patching, password changes, and software regulation.
Mobile device management
*
Management solutions use agents on devices to _______________________
enforce configurations and can remotely wipe or disable devices.
*
Organizations often have __________ policies regulating personal and corporate device use in the workplace.
BYOD
*
_________________ are easier to manage centrally, allowing stricter control over apps and security settings.
Corporate-owned devices
*
__________ ________________may have limited management capabilities, potentially subverted by savvy users.
*
Personal devices
Many organizations allow a mix of personal and corporate-owned devices with varying levels of _______________ and ______________.
access and security features.
*
Mobile devices face several specific security issues, including__________________________.
baseband operating system vulnerabilities.
*
The baseband operating system handles_______________ and ____________________.
*
hardware functions and is often proprietary and infrequently updated
Baseband vulnerabilities can lead to attacks like ___________________________.
*
spying on cell phone communications via SS protocol.
_____________ removes manufacturer restrictions, often disabling security features and leaving devices vulnerable.
*
Jailbreaking
Jailbreaks typically require
_____________to bypass security, sometimes disabling features or patching files permanently.
*
exploits
_____________ patch jailbreak vulnerabilities in new OS versions, leading to a ___________ being developed.
*
Vendors; cycle of new jailbreaks
Management solutions and anti-malware apps can help ______________________.
prevent or detect jailbreaking attempts.
*
_____________can compromise mobile device security by exploiting granted privileges.
Malicious apps
*
Even official app stores aren’t completely safe from malicious apps, as shown by ____________________
cryptocurrency app incidents.
*
Jailbroken devices are especially vulnerable to___________________.
malicious apps from unofficial sources.
*
To protect against malicious apps, stick to _____________ and avoid _____________.
official app stores; jailbreaking
*
Lack of________ ____________for mobile devices and apps can cause major security problems.
*
timely updates
Manufacturers often ______________ older devices, leaving them vulnerable to new security threats.
*
stop updating
App updates can also be ____________, especially for _____________with less consistent support.
problematic; smaller apps
*
Users can mitigate update issues by choosing devices from __________________.
vendors with better update track records.