Mobile Device Security Flashcards
Securing Wireless Devices
Wi-Fi Protected Access 2 (WPA2) is the highest level of wireless security.
Advanced Encryption Standard (AES).
Bluetooth pairing creates a shared link key to encrypt the connection.
Wired devices are almost always more secure than wireless ones.
Mobile Malware
Ensure your mobile device is patched and updated.
Only install apps from the official App Store or Play Store.
Do not jailbreak/root device.
Don’t use custom firmware or a custom ROM.
Only load official store apps.
Always update your phone’s OS.
SIM Cloning & ID Theft
Subscriber Identity Module (SIM) - integrated circuit that securely stores the international mobile subscriber identity (IMSI) number and its related key.
SIM Cloning - allows two phones to utilize the same service and allows an attacker to gain access to the phone’s data; SIM v1 cards were easy to clone but newer SIM v2 cards are much harder; Be careful with where you post phone numbers.
Bluetooth Attacks
Bluejacking - sending of unsolicited messages to Bluetooth-enabled devices.
Bluesnarfing - unauthorized access of information from a wireless device over a Bluetooth connection.
Bluejacking sends information to a device.
Bluesnarfing takes information from a device.
Mobile Device Theft
Always ensure your device is backed up.
Don’t try to recover your device alone if it’s stolen.
Remote Lock - requires a PIN or password before someone can use the device.
Remote Wipe - remotely erase all contents on a device to ensure the information is not recovered by the thief.
Security of Apps
Only install apps from official mobile stores.
Transport Layer Security (TLS)
Mobile Device Management (MDM) - centralized software solution that allows system admins to create and enforce policies across its mobile devices.
Turn location services off to ensure privacy.
Geotagging - embedded location in photos.
Geotagging should be considered when developing security policies.
Bring Your Own Device (BYOD)
Introduces a lot of security issues to consider.
Storage Segmentation - creating a clear separation between personal and company data on a single device.
MDM - centralized software solution for remote administration and configuration of mobile devices.
Choose Your Own Devices (CYOD)
MDM can prevent certain apps from being installed on the device.
Ensure the org has a good policy for mobile devices.
Hardening Mobile Devices
- Update your device to the latest version of software.
- Install AntiVirus
- Train users on proper security and use of the device
- Only install apps from the official mobile stores
- Do not root or jailbreak devices
- Only use v2 SIM cards with your devices
- Turn off all unnecessary features
- Turn on encryption for voice and data
- Use strong passwords or biometrics
- Don’t allow BYOD
Ensure organization has a good security policy for mobile devices.