Given a scenario, implement secure mobile solutions Flashcards

1
Q

Connection methods and receivers

A
Cellular
WiFi
Bluetooth
NFC
Infrared
USB
Point-to-point
Point-to-multipoint
Global Positioning System (GPS)
RFID
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cellular

A

Smartphones and some tablets use the cell phone network for calls and data access. A cellular data connection is less likely to be subject to monitoring and filtering. It may be appropriate to disable it when a device has access to an enterprise network or data, to prevent its use for data exfiltration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WiFi

A

Mobile devices usually default to using a Wi-Fi connection for data, if present. If the user establishes a connection to a corporate network using strong WPA3 security, there is a fairly low risk of eavesdropping or man-in-the-middle attacks. The risks from Wi-Fi come from users connecting to open access points or possibly a rogue access point imitating a corporate network. These allow the access point owner to launch any number of attacks, even potentially compromising sessions with secure servers (using a DNS spoofing attack, for instance).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bluetooth

A

Bluetooth is one of the most popular technologies for implementing PANs. While native Bluetooth has fairly low data rates, it can be used to pair with another device and then use a Wi-Fi link for data transfer. This sort of connectivity is implemented by iOS’s AirDrop feature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NFC

A

A standard for peer-to-peer (2-way) radio communications over very short (around 4”) distances, facilitating contactless payment and similar technologies. NFC is based on RFID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Infrared

A

nfrared signaling has been used for PAN in the past (IrDA), but the use of infrared in modern smartphones and wearable technology focuses on two other uses:

IR blaster—this allows the device to interact with an IR receiver and operate a device such as a TV or HVAC monitor as though it were the remote control handset.
IR sensor—these are used as proximity sensors (to detect when a smartphone is being held to the ear, for instance) and to measure health information (such as heart rate and blood oxygen levels).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

USB

A

Android devices can be connected to a computer via the USB port. Apple devices require a lightning-to-USB converter cable. Once attached the computer can access the device’s hard drive, sync or backup apps, and upgrade the firmware.

Some Android USB ports support USB On The Go (OTG) and there are adapters for iOS devices. USB OTG allows a port to function either as a host or as a device. For example, a port on a smartphone might operate as a device when connected to a PC, but as a host when connected to a keyboard or external hard drive. The extra pin communicates which mode the port is in.

There are various ways in which USB OTG could be abused. Media connected to the smartphone could host malware. The malware might not be able to affect the smartphone itself but could be spread between host computers or networks via the device. It is also possible that a charging plug could act as a Trojan and try to install apps (referred to as juice-jacking), though modern versions of both iOS and Android now require authorization before the device will accept the connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Point-to-point

A

A point-to-point topology is one where two nodes have a dedicated connection to one another. In a point-to-multipoint topology, a central node mediates links between remote nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Point-to-multipoint

A

A point-to-point topology is one where two nodes have a dedicated connection to one another. In a point-to-multipoint topology, a central node mediates links between remote nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Global Positioning System (GPS)

A

Means of determining a receiver’s position on the Earth based on information received from GPS satellites. The receiver must have line-of-sight to the GPS satellites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RFID

A

A means of encoding information into passive tags, which can be easily attached to devices, structures, clothing, or almost anything else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mobile device management (MDM)

A
Application management
Content management
Remote wipe
Geofencing
Geolocation
Screen locks
Push notifications
Passwords and PINs
Biometrics
Context-aware authentication
Containerization
Storage segmentation
Full device encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application management

A

Enterprise management function that enables control over apps and storage for mobile devices and other endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Content management

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Remote wipe

A

Software that allows deletion of data and settings on a mobile device to be initiated from a remote server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Geofencing

A

The practice of creating a virtual boundary based on real-world geography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Geolocation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Screen locks

A

The screen lock can also be configured with a lockout policy. This means that if an incorrect passcode is entered, the device locks for a set period. This could be configured to escalate (so the first incorrect attempt locks the device for 30 seconds while the third locks it for 10 minutes, for instance). This deters attempts to guess the passcode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Push notifications

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Passwords and PINs

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Biometrics

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Context-aware authentication

A

An access control scheme that verifies an object’s identity based on various environmental factors, like time, location, and behavior.

23
Q

Containerization

A

A type of virtualization applied by a host operating system to provision an isolated execution environment for an application.

24
Q

Storage segmentation

A
25
Q

Full device encryption

A
26
Q

Mobile devices

A

MicroSD HSM
MDM/Unified Endpoint Management (UEM)
Mobile application management (MAM)
SEAndroid

27
Q

MicroSD HSM

A
28
Q

MDM/Unified Endpoint Management (UEM)

A
29
Q

Mobile application management (MAM)

A
30
Q

SEAndroid

A
31
Q

Enforcement and monitoring of:

A
Third-party application stores
Rooting/jailbreaking
Sideloading
Custom firmware
Carrier unlocking
Firmware over-the-air (OTA) updates
Camera use
SMS/Multimedia Messaging Service (MMS)/Rich communication services (RCS)
External media
USB On-The-Go (USB OTG)
Recording microphone
GPS tagging
WiFi direct/ad hoc
Tethering
Hotspot
Payment methods
32
Q

Third-party application stores

A
33
Q

Rooting/jailbreaking

A
34
Q

Sideloading

A
35
Q

Custom firmware

A
36
Q

Carrier unlocking

A
37
Q

Firmware over-the-air (OTA) updates

A
38
Q

Camera use

A
39
Q

SMS/Multimedia Messaging Service (MMS)/Rich communication services (RCS)

A
40
Q

External media

A
41
Q

USB On-The-Go (USB OTG)

A
42
Q

Recording microphone

A
43
Q

GPS tagging

A
44
Q

WiFi direct/ad hoc

A
45
Q

Tethering

A
46
Q

Hotspot

A
47
Q

Payment methods

A
48
Q

Deployment models

A
Bring your own device (BYOD)
Corporate-owned personally enabled (COPE)
Choose your own device (CYOD)
Corporate-owned
Virtual desktop infrastructure (VDI)
49
Q

Bring your own device (BYOD)

A
50
Q

Corporate-owned personally enabled (COPE)

A
51
Q

Choose your own device (CYOD)

A
52
Q

Corporate-owned

A
53
Q

Virtual desktop infrastructure (VDI)

A