Mobile Security Flashcards
What is the difference between a point-to-point wireless connection and a point-to-multipoint wireless connection?
Point-to-point is a 1 to 1 connection. One device is only connected another device wirelessly and that is it.
Point-to-multipoint is what we will most commonly see in wireless network connections, almost exclusively. One device is connected to many different different devices wirelessly.
This doesn’t imply full connectivity between all of the different devices to each other, they might be too far apart from each other. But one device is connected to many different devices.
What is the difference between MDM and MCM?
Mobile device management is focused on the overall security of a device, such as which apps are installed, version numbers, etc.
Mobile Content Management (MCM) is focused on the data stored on the mobile device.
You can limit file sharing and viewing.
You can implement DLP to prevent the copy/pasting of sensitive data.
You can ensure data is encrypted on the mobile device.
All of these security options are configured on the mobile device manager, and its up to the administrator of the MDM to configure and set these options.
What is a remote wipe?
This is a way of deleting everything from a mobile device when you don’t have access to it.
Often managed from the MDM
You want to always have a backup if you’re using this so you can get everything back.
What is geofencing?
This is an MDM tool for restricting or allowing features only when a device is in a particular area.
For example: the camera might only work when outside the office.
This can also be used for authentication.
Example: only allow logins when the device is located in a particular area.
What is Context-aware authentication?
This is an authentication method that draws on multiple different sources of context such as:
Where you normally log in (IP address)
Where you normally frequent(GPS information)
Other devices that may be paired(Bluetooth, etc)
What is containerization in the context of MDM?
This is a way of separating enterprise mobile apps and data from personal apps and data on a device.
Creates a virtual “container” for company data.
There is limiting data sharing from this contained area, and storage segmentation keeps data separate.
Makes it very easy to manage offboarding and data security.
What would the HSM look like in a mobile phone or other very small device?
Instead of a larger HSM like you find in a computer, the HSM in a mobile phone will be on a MicroSD card.
This is called a MicroSD HSM.
Provides all of the features of a normal HSM: Encryption Key generation/Key storage Decryption Digital signatures Authentication
What is a UEM solution? (unified endpoint management)
A way of managing security posture on a variety of devices and making sure that they all meet the same security requirements.
What is MAM?
Mobile application management
Like MDM but for specific applications.
This would be a solution for provisioning, updating, and removing apps.
An example of this would be to create an enterprise app catalog, users could choose and install the apps they need.
This allows the administrator of the MAM to monitor how these applications are being used.
This also allows finely grained control over the data on these mobile devices, so that you can remove just data from one app but leave all of the other data intact.
What is SEAndroid?
Security Enhancements for Android
This is basically taking the SELinux functionality and adding it to the android operating system.
This supports access control security policies.
It addresses a broad scope of system security such as: the kernal, userspace,and policy configuration.
Uses Mandatory access control (MAC)
Enabled by default in android.
Also isolates and sandboxes android apps.
What is the difference between geofencing and geotagging?
Geofencing is the process of limiting access based on location or authenticating based on location.
Geotagging is when your location is used in the metadata of a file. The metadata of most photos contains the location it was taken in.
Geotagging=Location in metadata
What is ad hoc mode?
This is when two devices can directly connect to each other wirelessly without needing an access point.
WiFi direct simplifies this process. It is common to see in home IoT devices.
What is BYOD?
Bring your own device.
Employees are allowed to bring their own device to work
What is COPE?
Corporate owned, but personally enabled.
This is a mobile deployment model where the company buys the device for you, but it is used both as a corporate device, and a personal device.
Since the device is owned by the company, they have full control of everything on the device. Information can be deleted at any time.
What is CYOD?
Choose your own device.
Very similar to COPE, but you get to decide what device you want to use, and then the organization purchases that device for you, but they own it.