Mobile Device Security Flashcards
Used by mobile devices to make a connection to high-speed Internet
Wi-Fi
Used by mobile devices to connect peripherals to the device, such as wireless headphones, wireless mice, wireless keyboards, etc.
Bluetooth
Normally 4-8 digits long, depending on your smartphone or device
PIN Code
The screen shows you nine different dots for you to swipe and make a pattern with
Pattern
Malware that can come to you through SMS
Pre-texting
Requires a PIN or a password before someone can use the device
Remote Lock
Allows to remotely erase the contents of the device to ensure that no information can be recovered
Remote Wipe
TLS
Transport Layer Security
Centralized software solution that allows system administrators to create and enforce policies across its mobile devices
Mobile Device Management (MDM)
Embedding of the geolocation coordinates into a piece of data, such as a photo or video
Geotagging
Four common models of business devices
1) COBO
2) COPE
3) CYOD
4) BYOD
Purchased by the company and only used by the employee for work-related purposes
COBO (Cooperate Owner/ Business Only)
Company provides a device used for work and/or personal use by employees
COPE (Corporate Owned/ Personally Enabled)
Allows employees to choose a device from an approved list of vendors or devices
CYOD (Choose Your Own Device)
Allows employees to bring their own devices, and connect to the corporate network
BYOD (Bring Your Own Device)
Creates a clear separation between work and personal data on a device
Storage Segmentation
Centralized software solution for remote administration and configuration of mobile devices
Mobile Device Management (MDM)
Hardening Mobile Devices (5)
1) Update your device to the latest software
2) Install Antivirus
3) Train users on proper security and use of their device
4) Only install apps from the official app stores
5) Do not jailbreak or root your devices
6) Only use Version 2 SIM cards for your devices
7) Turn off all unnecessary features on your device
8) Turn on encryption for voice and data
9) Use strong passwords or biometrics
10) Don’t deploy BYOD
Which of the following types of screen locks uses a secret pattern drawn on the screen to prevent access to a mobile device?
a) Swipe
b) FaceID
c) Passcode
d) TouchID
a) Swipe
Fail to Pass Solutions has requested that its employees have a mobile device so that they can respond to questions when they are out of the office. Each employee is responsible for buying their Android smartphone and cellular plan service. To access the corporate network and its data, the employees need to install a company-provided APK on their device. This app contains access to their company-provided email, cloud storage, and customer relationship management (CRM) database. Which of the following policies BEST describes Fail to Pass’s mobile device deployment model?
a) COBO
b) BYOD
c) COPE
d) CYOD
b) BYOD
A business owner’s smartphone contains a lot of her customer’s PII. Unfortunately, the business owner refuses to set up the phone to automatically wipe the data if the phone is lost or stolen because the data is precious. Based on the business owner’s refusal to allow automatic wiping of the data, which of the following is the next BEST method of securing the phone?
a) Enable a PIN lock on the device
b) Enable swipe lock on the device
c) Enable fingerprint lock on the device
d) Enable a passcode lock on the device
c) Enable fingerprint lock on the device