Mobile Device Security Flashcards

1
Q

Near field communication (NFC)

A

Employment of electromagnetic induction to enable communication between devices within 10cm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Satellite communications (SATCOM)

A

Artificial geostationary satellite that provides services across the globe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cellular Communication

A

Based on a single network tower that serves devices located within a certain radius.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ANT

A

A wireless sensor protocol that enables communication between sensors and their controllers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Universal serial bus (USB)

A

Enabled wired communication between devices that can be used for power supply, and serial data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Global positioning system (GPS)

A

A system that determines the precise location of something on earth through a series of satellites, tracking stations, and recievers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Infrared (IR)

A

A wireless technology for transmitting data between two devices in the digital form within 5m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wi-Fi

A

A common wireless technology used in homes and office buildings to connect local devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bluetooth

A

A short range high speed low power wireless technology that enables communication between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

5G cellular Communication

A

A broadband cellular network that operates at low latency, high bandwidth, and provides high speed downloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Point to point (P2P) connection

A

Enables secure communication between two devices without encryption, through a fixed path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Point to multipoint connection

A

Allows one to many connections by providing multiple paths from a single location to many others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Radio frequency identification (RFID)

A

A form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mobile app management

A

Used by IT admins and others to secure and control organizational data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mobile security management

A

The actions and precautionary steps for securing the organizations data and mobile devices used by it’s members

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Enterprise Mobility Management

A

Used to secure data in employees personal devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Remote wipe

A

Allows admins to remotely remove data from a mobile device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Screen lock

A

Used to prevent unauthorized access to the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Passwords/pins

A

Form of authentication on electric devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Geolocation

A

Can identify the real world location of devices through the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Geofencing

A

Virtual fence that interferes with mobile users when they cross an arbitrary line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Full device encription

A

Can encrypt all data stored within a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Containerization

A

The application of encryption software to segment a device between personal data and the encrypted organizational data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BYOD

A

Bring your own device

25
Q

COPE

A

Company owned personally enabled

26
Q

COBO

A

Company owned business only

27
Q

CYOD

A

Choose your own device

28
Q

What are the benefits of BYOD

A

Low cost, less employee aggravation

29
Q

What are the downsides of BYOD

A

Difficult to maintain security, comparability issues which make it hard to scale

30
Q

What must be done to successfully implement BYOD

A
Define the specs
Decide how the data will be managed
Policies
How security will be implemented
How support will be issued
31
Q

What are the benefits of CYOD

A

Streamlines options
Able to control the devices without overly disturbing employees
Devices meet any spec requirements
Lower cost than COPE

32
Q

What are the disadvantages of CYOD

A

Employees must seek out repairs and replacement
Must use updates though the organization
Slow deployment timeframe

33
Q

What must be done to implement a CYOD policy?

A

Define a set of devices
A set of deletion policies
Define the security that must be implemented
Define how support will be obtained by user

34
Q

What are the benefits to the COPE policy

A

Greater control
Org retains device ownership
Prevents multiple devices from being required

35
Q

What are some of the downsides of COPE

A

Org will be required to purchase the device
Monitoring policies will need to be put in place
Business will be required to update all devices
Slow deployment time

36
Q

What will be needed to deploy a COPE policy

A

The purchasing of devices and required software
Allow employees to work with the device to develop a tech portfolio
Develop policies
Deploy security and support

37
Q

What are the benefits of COBO

A

Prevents data loss

The org posseses full authority

38
Q

What are the downsides of COBO

A

High purchase cost

Requires employees to carry multiple devices

39
Q

What must be done to implement a COBO policy?

A

Prohibit personal use on business devices
Allow employees to get used to the device
Develop policies
Deploy security and support on COBO devices

40
Q

Enterprise Mobile Device Security risks

A

Weak security systems
Insufficient config allowance
Can be taken outside the bounds of physical security

41
Q

What challenges face mobile devices when it comes to security?

A

Harder to track and secure
Can be easily mismanaged
Have to ensure all devices are up to date

42
Q

Risks for all mobile policies

A

The sharing of confidential data

Data leakage and endpoint security

Supporting different devices/ OS’s

Mixing of personal and private data

The ability to bypass policy issues

Disgruntled employees

43
Q

Sec prof guidelines for Mobile policies

A

Ensure multi-layer protection of systems

Educate the employees

Clarify which apps and data are owned by who

Use of encrypted channels for sensitive data

Clarify any bans

Control access

Ensure employees sign off on the policies

44
Q

Employee guidelines for Mobile policies

A

Use encryption to store all sensitive data

Maintain a separation of org and personal data

Register devices that contain any org data

Update the OS regularly

Use anti-virus and DLP solutions

Set a strong passcode

45
Q

Mobile device Management (MDM)

A

Used to deploy, manage, and monitor org owned devices

46
Q

Features of MDM solutions

A

Security management

Device configuration

Device inventory and tracking

Over the air distribution

Policy management

Password enforcement

Data encryption enforcement

Network integration

Remote data wipe

Blacklisting/ whitelisting of apps and devices

47
Q

Mobile application management (MAM)

A

Enables network defenders to secure, manage, and distribute applications on employee mobile devices

48
Q

What are the features of an MAM solution

A

Device activation

Enrollment in provisioning capabilities

Remote wipe and other device level functionality

Minimal admin intervention

49
Q

Mobile Content Management (MCM) or Mobile Information Management (MIM)

A

Provides secure access to corporate data

Enables secure sharing

50
Q

Mobile Threat Defence (MTD)

A

As to secure mobile devices against malicious threats, network attacks, and device vulnerabilities

51
Q

Mobile Email Management (MEM)

A

Pre-config emails on devices remotely, ensures that only approved apps and devices can access the emails, prevents unauthorized access to emails, pre installs the email client

52
Q

Unified endpoint management (UEM)

A

Ensures remote provisioning, managing, controlling, and securing internet based solutions

Tracking device usage

Remote, Manuel, or auto pushing of updates

Supporting employee owned devices

Threat detection and mitigation

53
Q

Enterprise Mobility Management (EMM)

A

A comprehensive solution responsible for MDM, MAM, MTM, MCM, and MEM. Secures and manages devices across multiple OSs.

54
Q

Mobile app security best practices

A

Ensures that the app does not save passwords

Avoid the use of the query string while handling sensitive data

Use code obfuscation and encryption

Implement two-factor authentication

Use SSL/TLS to send data over secure channels

Avoid caching app data

Perform validation checks on input data

Implement secure session management

55
Q

Mobile data security best practices

A

Encrypt the data stored on the device

Enable over the air encryption

Backup the mobile data periodically

Do not store extremely sensitive data on the device

Do not store passwords or pins as contacts

Use private data centers to store data

56
Q

Mobile network security guidelines

A

Disable interfaces like Bluetooth, IR, and WiFi when not in use

Set Bluetooth enabled devices to non discoverable

Avoid connecting to unknown WiFi

Config web accounts to use secure connections

57
Q

General guidelines for Mobile platform security

A

Avoid excessive installation of apps

Avoid auto uploading photos

Maintain configuration control and management

Install from trusted sources

Wipe or delete data before disposing a device

Disable GPS unless required

58
Q

Kaspersky

A

Internet security for Android uses machine learning to combat new threats

59
Q

Avira

A

Mobile security for iOS devices provides web protection, identity safeguarding, and identifies phishing websites.