chapter 8 Flashcards
1
Q
Mobile Infrastructure Risks
A
- Software
- Hardware
- Network
- Organization
2
Q
- fake access point
- can obtain user credentials
- it uses weak authentication methods
- Open authentication
- shared authentication
- WEP
- This can be found in corporate environment, bookstore, basta sa public
A
Rogue Access point
3
Q
- Send deauthentication traffic
- Get user to re-enter credentials, but attacker is sniffing
- preventing a client from communicating with wireless network
- use rogue points that overpower the legitimate one
A
Denial of service
4
Q
- Drive around looking for unprotected wireless network
A
Wardriving
5
Q
- marks and symbols on the sidewalk or wall identifying a vulnerable access point
A
warchalking
6
Q
- intercept communication between the transmitter and receiver
- take advantage of weak encryption algorithm and weak keys
A
Man in the middle
7
Q
how to avoid man in the middle
A
- use stronger keys
- strong encryption methods, implemented correctly
8
Q
- spoof a carrier’s tower and infrastructure so that devices connect to it
A
- Tower spoofing
9
Q
use of untrusted or compromised applications on mobile devices
A
Software risks
10
Q
what app store that are safe
A
- apple and microsoft
11
Q
what app store that is not safe
A
- android
12
Q
malicious software
A
malware
13
Q
transferred via files or executable software from device to device
A
virus
14
Q
masquerades as a useful program
A
trojan
15
Q
self replicate across a network
A
worm