Mobile Device Security Flashcards
SIM & SIM Cloning
Subscriber Identity Module:
Integrated circuit that securely stores the international mobile subscriber identity (IMSI) number and its related key
SIM Cloning:
Allows two phones to utilize the same service and allows an attacker to gain access to the phone’s data
SIM v1 cards were easy to clone but newer SIM v2 cards are much harder
Be careful with where you post phone numbers
Bluejacking & Bluesnarfing
Bluejacking:
Sending of unsolicited messages to Bluetooth-enabled devices
Bluesnarfing:
Unauthorized access of information from a wireless device over a Bluetooth connection
Geotagging
Embedding of the geolocation coordinates into a piece of data (i.e., a photo)
BYOD: Storage Segmentation
Creating a clear separation between personal and company data on a single device
CYOD: Choose Your Own Device
MDM
Mobile Device Management:
Centralized software solution for remote administration and configuration of mobile devices
MCM
Mobile Content Management: Secure access to data Protect data from outsiders DLP Ensuring data is encrypted
MAM
Mobile Application Management: Provision, update & remove apps Keep everyone on same version Can create an enterprise app catalog Monitor app use Remote wipe app data
SEAndroid
Security Enhancements for Android
SELinux in the Android OS
Supports access control security policies
NSA project
Prevent malicious activity
MAC & DAC