Lesson 9 A Flashcards
screen lock
If threat actors can access smartphones or tablets, they can obtain a huge amount of information with which to launch further attacks. Apart from confidential data files that might be stored on the device, it is highly likely that the user has cached passwords for services such as email or remote access VPN and websites. In addition to this, access to contacts and message history (SMS, text messaging, email, and IM) greatly assists social engineering attacks. Consequently, it is imperative that mobiles be protected against loss, theft, and lunchtime attacks by a screen lock.
A screen lock activates if the device is unused or if the user presses the power button. The user must perform a gesture to unlock the device. A swipe gesture means that access to the device is unauthenticated. Simply swiping across the screen will unlock the device. While this might be suitable for a tablet deployed for shared or public use, access to a personal device must be protected by an authentication mechanism
Personal identification number (PIN)
or password—Most devices require a PIN or password to be configured to enable screen lock authentication and generate an encryption key. The PIN can act as a primary or backup authentication method. If the device is configured to limit the number of attempts, a 4- or 6-digit PIN should offer adequate security for general users as long as the chosen PIN is not a simple sequence (1234 or 4321) or an easily guessable date. If there is a high risk of compromise, a strong password should be configured.
Fingerprint
Many devices use a fingerprint sensor as a bio-gesture unlocking method. The user performs an enrollment fingerprint scan to create a template that is stored within a secure cache on the device. To authenticate, the user touches the reader, and the device compares the confirmation scan to the template.
Facial recognition
This method creates a template computed from a 3-D image of the user’s face. A facial bio gesture has the advantage of being able to use the camera rather than a special sensor.
If a bio gesture is configured, the PIN or password acts as a backup mechanis
Pattern
This requires the user to swipe a “join-the-dots” pattern. The pattern method has numerous weaknesses. It is easy to observe and can be reconstructed from smudges. Research has also demonstrated that users tend to select predictable patterns, such as C, M, N, O, and S shapes.
A screen lock can be configured to restrict
failed login attempts . This means that if an incorrect passcode or bio gesture is used, the device locks for a set period. This could be configured to escalate—so the first incorrect attempt locks the device for 30 seconds, while the third locks it for 10 minutes, for instance. This deters attempts to guess the passcode or use a spoofed biometric.
Mobile devices can use the same
classes of security software as PCs and laptops to protect against malware, phishing, and software exploits.
Patching/OS Updates
Keeping a mobile OS and its apps up to date with patches/OS updates (and ideally new OS versions) is as critical as it is for a desktop computer. The install base of iOS is generally better at applying updates because of the consistent hardware and software platform. Updates for iOS are delivered via Settings > General > Software Update . App updates are indicated via notifications on the AppStore app icon and delivered via the Updates page in the app store.
Android patches are more reliant on the device vendor as they must develop the patch for their own “flavor” of Android. Support for new OS versions can also be mixed. Android uses the notification bar to deliver updates. You can also go to Settings > System > Advanced > System updates.
Antivirus/Anti-malware Apps
Modern smartphones are vulnerable to software exploits and being targets of malware and viruses, especially if an untrusted app source has been configured. However, the emerging nature of mobile OS threats and vulnerabilities makes it difficult to create pattern databases of known threats or to use heuristics to identify malicious app behaviors.
Antivirus/anti-malware apps designed for mobile devices tend to work more like content filters to block access to known phishing sites and block adware/spyware activity by apps. Most security scanner apps will also detect configuration errors and monitor the permissions allocated to apps and how they are using (or abusing) them. These apps usually also offer a third-party data backup and device location service.
Bring your own device (BYOD)
The mobile device is owned by the employee. The mobile will have to meet whatever profile is required by the company (in terms of OS version and functionality), and the employee will have to agree on the installation of corporate apps and to some level of oversight and auditing. This model is usually the most popular with employees but poses the most difficulties for security and network managers.
Corporate owned, business only (COBO)
The device is the property of the company and may only be used for company business.
Corporate owned, personally enabled (COPE)
The device is chosen and supplied by the company and remains its property. The employee may use it to access personal email and social media accounts and for personal web browsing (subject to whatever acceptable use policies are in force).
Choose your own device (CYOD)
Similar to COPE but the employee is given a choice of device from a list.
Mobile Device Management (MDM)
is a class of enterprise software designed to apply security policies to the use of smartphones and tablets in business networks. This software can be used to manage corporate-owned devices as well as BYOD.
When the device is enrolled with the management software
it can be configured with policies to allow or restrict use of apps, corporate data, and built-in functions such as a video camera or microphone. Policies can also be set to ensure the device patch status is up to date, that antivirus software is present and updated, and that a device firewall has been applied and configured correctly.
A company needs to create a profile of security requirements and policies to apply for different employees and different sites or areas within a site. For example, it might be more secure to disable the camera function of any smartphone while onsite, but users might complain that they cannot use their phones for video calls. A sophisticated security system might be able to apply a more selective policy and disable the camera only when the device is within an area deemed high risk from a data confidentiality point of view. Some policies can be implemented with a technical solution; others require “soft” measures, such as training and disciplinary action.