Lesson 12 - Chapter 3: Mobile OS and Application Security Issues Flashcards
What are trusted sources?
legitimate app stores run by major vendors (Apple, Google, Microsoft, Amazon)
Do modified versions of Android change which stores and sources a device will/won’t trust?
Yes
Which OS allows installing apps from untrusted sources?
Android
What restrictions does Apple place on developers for apps sold via the App store?
Apple has specific requirements for how developers create an app to be sold in the store
What would be an example of modified versions of Android changing which stores a device will/won’t trust?
Amazon’s line of Fire devices can only get apps from the Amazon App store
Which app store is more likely to have security issues?
Google Play
(aren’t subject to guidelines as strict as Apple Store)
What are 3 examples of legitimate third-party app sources?
- Device manufacturers
- Communication carriers
- In-house corporate dev sources
What are 4 tools you can use to identify and mitigate network attack risks?
- Device security settings (no auto-connect)
- User training
- Wi-Fi analyzers
- Cell tower analyzers
What can you use to configure mobile device security settings for more than one device?
MDM or similar software (like Apple Configurator)
What is a Wi-Fi analyzer typically used for? (3)
figuring out what channel a network should use. optimizing WAP placement, finding dead spots
What can you use to map out nearby networks to identify malicious WAPs?
Wi-Fi Analyzer
What are cell tower analyzers used for? (4 out of more)
- identify nearby cellular signals
- estimate distance and direction
- measure signal strength (in a building)
- collect information on the technologies they’re using and network name
How can cell tower analyzers help with network security?
spots an illegitimate tower operating nearby
Does malware and security breaches manifest differently on mobile devices than on desktops and laptops?
Yes
Which OS is more susceptible to malware infections?
Android lacks safeguards that iOS has (malware infections are almost impossible on iOS devices)
can supplement with 3rd party antivirus/anti-malware