Given a scenario, implement secure mobile solutions Flashcards

1
Q

Connection methods and receivers

A
Cellular
WiFi
Bluetooth
NFC
Infrared
USB
Point-to-point
Point-to-multipoint
Global Positioning System (GPS)
RFID
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cellular

A

Smartphones and some tablets use the cell phone network for calls and data access. A cellular data connection is less likely to be subject to monitoring and filtering. It may be appropriate to disable it when a device has access to an enterprise network or data, to prevent its use for data exfiltration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WiFi

A

Mobile devices usually default to using a Wi-Fi connection for data, if present. If the user establishes a connection to a corporate network using strong WPA3 security, there is a fairly low risk of eavesdropping or man-in-the-middle attacks. The risks from Wi-Fi come from users connecting to open access points or possibly a rogue access point imitating a corporate network. These allow the access point owner to launch any number of attacks, even potentially compromising sessions with secure servers (using a DNS spoofing attack, for instance).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bluetooth

A

Bluetooth is one of the most popular technologies for implementing PANs. While native Bluetooth has fairly low data rates, it can be used to pair with another device and then use a Wi-Fi link for data transfer. This sort of connectivity is implemented by iOS’s AirDrop feature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NFC

A

A standard for peer-to-peer (2-way) radio communications over very short (around 4”) distances, facilitating contactless payment and similar technologies. NFC is based on RFID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Infrared

A

nfrared signaling has been used for PAN in the past (IrDA), but the use of infrared in modern smartphones and wearable technology focuses on two other uses:

IR blaster—this allows the device to interact with an IR receiver and operate a device such as a TV or HVAC monitor as though it were the remote control handset.
IR sensor—these are used as proximity sensors (to detect when a smartphone is being held to the ear, for instance) and to measure health information (such as heart rate and blood oxygen levels).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

USB

A

Android devices can be connected to a computer via the USB port. Apple devices require a lightning-to-USB converter cable. Once attached the computer can access the device’s hard drive, sync or backup apps, and upgrade the firmware.

Some Android USB ports support USB On The Go (OTG) and there are adapters for iOS devices. USB OTG allows a port to function either as a host or as a device. For example, a port on a smartphone might operate as a device when connected to a PC, but as a host when connected to a keyboard or external hard drive. The extra pin communicates which mode the port is in.

There are various ways in which USB OTG could be abused. Media connected to the smartphone could host malware. The malware might not be able to affect the smartphone itself but could be spread between host computers or networks via the device. It is also possible that a charging plug could act as a Trojan and try to install apps (referred to as juice-jacking), though modern versions of both iOS and Android now require authorization before the device will accept the connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Point-to-point

A

A point-to-point topology is one where two nodes have a dedicated connection to one another. In a point-to-multipoint topology, a central node mediates links between remote nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Point-to-multipoint

A

A point-to-point topology is one where two nodes have a dedicated connection to one another. In a point-to-multipoint topology, a central node mediates links between remote nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Global Positioning System (GPS)

A

Means of determining a receiver’s position on the Earth based on information received from GPS satellites. The receiver must have line-of-sight to the GPS satellites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RFID

A

A means of encoding information into passive tags, which can be easily attached to devices, structures, clothing, or almost anything else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mobile device management (MDM)

A
Application management
Content management
Remote wipe
Geofencing
Geolocation
Screen locks
Push notifications
Passwords and PINs
Biometrics
Context-aware authentication
Containerization
Storage segmentation
Full device encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application management

A

Enterprise management function that enables control over apps and storage for mobile devices and other endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Content management

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Remote wipe

A

Software that allows deletion of data and settings on a mobile device to be initiated from a remote server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Geofencing

A

The practice of creating a virtual boundary based on real-world geography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Geolocation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Screen locks

A

The screen lock can also be configured with a lockout policy. This means that if an incorrect passcode is entered, the device locks for a set period. This could be configured to escalate (so the first incorrect attempt locks the device for 30 seconds while the third locks it for 10 minutes, for instance). This deters attempts to guess the passcode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Push notifications

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Passwords and PINs

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Biometrics

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Context-aware authentication

A

An access control scheme that verifies an object’s identity based on various environmental factors, like time, location, and behavior.

23
Q

Containerization

A

A type of virtualization applied by a host operating system to provision an isolated execution environment for an application.

24
Q

Storage segmentation

25
Full device encryption
26
Mobile devices
MicroSD HSM MDM/Unified Endpoint Management (UEM) Mobile application management (MAM) SEAndroid
27
MicroSD HSM
28
MDM/Unified Endpoint Management (UEM)
29
Mobile application management (MAM)
30
SEAndroid
31
Enforcement and monitoring of:
``` Third-party application stores Rooting/jailbreaking Sideloading Custom firmware Carrier unlocking Firmware over-the-air (OTA) updates Camera use SMS/Multimedia Messaging Service (MMS)/Rich communication services (RCS) External media USB On-The-Go (USB OTG) Recording microphone GPS tagging WiFi direct/ad hoc Tethering Hotspot Payment methods ```
32
Third-party application stores
33
Rooting/jailbreaking
34
Sideloading
35
Custom firmware
36
Carrier unlocking
37
Firmware over-the-air (OTA) updates
38
Camera use
39
SMS/Multimedia Messaging Service (MMS)/Rich communication services (RCS)
40
External media
41
USB On-The-Go (USB OTG)
42
Recording microphone
43
GPS tagging
44
WiFi direct/ad hoc
45
Tethering
46
Hotspot
47
Payment methods
48
Deployment models
``` Bring your own device (BYOD) Corporate-owned personally enabled (COPE) Choose your own device (CYOD) Corporate-owned Virtual desktop infrastructure (VDI) ```
49
Bring your own device (BYOD)
50
Corporate-owned personally enabled (COPE)
51
Choose your own device (CYOD)
52
Corporate-owned
53
Virtual desktop infrastructure (VDI)