Module 5 - Mobile, Embedded and Specialized Device Security Flashcards
Akira is explaining to his team members the security constraints that have made it a challenge for protecting a new embedded system. Which of the following would Akira NOT include as a constraint?
a) Authentication
b) Cost
c) Power
d) Availability
D - Availability
To keep costs at a minimum, most embedded devices lack authentication features; to prolong battery life, devices and systems are optimized to draw very low levels of power and thus lack the ability to perform strong security measures; most developers are concerned primarily with making products as inexpensive as possible which means leaving out all security protections
Agape has been asked to experiment with different hardware to create a controller for a new device on the factory floor. She needs a credit-card-sized motherboard that has a microcontroller instead of a microprocessor. What would be the best solution?
Arduino
is a device similar to the Raspberry Pi but unlike the RAspberry Pi, which can function as a complete computer, the Arduino is designed as a controller for other devices: it has an 8-bit microcontroller instead of a 64-bit microprocessor, a limited amount of RAM and no operating system; it can only run programs compiled for the Arduino platform (most of which are written in C++), has only a single USB port and power input with a set of input/output pins for connections but consumes little power
Hakaku needs a tool with a single management interface that provides capabilities for managing and securing mobile devices, applications and content, What tool would be the best solution?
Unified Endpoint Management (UEM)
all the capabilities of Mobile Device Management (MDM), Mobile Application Management (MAM), and Mobile Content Management (MCM) can be supported by UEM; UEM is a group of class of software tools with a single management interface for mobile devices as well as computer devices; it provides capabilities for managing and securing mobile devices, applications and content
In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. What type of enterprise mobile device deployment model does this company support?
CYOD (Choose Your Own Device)
BYOD (Bring Your Own Device) - employees use their own personal mobile device for business purposes; employees have full responsibility for choosing and supporting the device; this model is popular with smaller companies or those with temporary staff
COPE (Corporate Owned Personally Enabled) - employees choose from a selection of company approved devices; employees are supplied the device chosen and paid for by the company, but they can also use it for personal activities; company decides the level of choice and freedom for employees
Aoi has been asked to provide research regarding adding a new class of Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Aoi NOT list in her report as a factor in the frequency of Android firmware OTA updates?
a) OEMs are hesitant to distribute Google updates because it limits their ability to differentiate themselves from competitors if all versions of Android start to look the same through updates
b) because many of the OEMs have modified Android they are reluctant to distribute updates that could potentially conflict with their changes
c) wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth the updates consume on their wireless networks
d) because OEMs want to sell as many devices as possible, they have no financial incentive to update mobile devices that users would then continue to use indefinitely
C - wireless carries are reluctant to provide firmware OTA updates because of the bandwidth the updates consume on their wireless networks
What is the process of identifying the geographical location of a mobile device?
Geolocation
mobile devices using geolocation are at increased risk of targeted physical attacks; an attacker can determine where users with mobile devices are currently located and use that information to follow them and steal the mobile devices or inflict physical harm; in addition, attackers can craft attacks by compiling a list of people with whom the users associate and the types of activities they perform
What is used to send SMS text messages to selected users or groups of users?
Push notification services
this is a part of mobile management tools under mobile device management (MDM)
Enki received a request by a technician for a new subnotebook computer. The technician noted that he wanted USB OTG support and asked Enki’s advice regarding it. Which of the following would Enki NOT tell him?
a) a device connected via USB OTG can function as a peripheral for external media access
b) a device connected via USB OTG can function as a host
c) USB OTG is only available for connecting Android devices to a subnotebook
d) connecting a mobile device to an infected computer using USB OTG could allow malware to be sent to that device
C - USB OTG is only available for connecting Android devices to a subnotebook
Banko’s sister has just downloaded and installed an app that allows her to circumvent the built-in limitations on her Android smartphone. What is this called?
rooting
this is how users access untrusted content; it is called jailbreaking on Apple iOS devices and rooting on Android devices; jailbreaking and rooting give access to the underlying OS and file system of the mobile device with full permissions
What technology is able to convert a texting application into a live chat platform?
rich communication service (RCS) - can convert a texting app into a live chat platform and supports pictures, videos, locations, stickers, and emojis; threat actors can craft RCS videos that can introduce malware into the device
What prevents a mobile device from being used until the user enters the correct passcode?
screen lock
this falls under mobile device protection (obviously); screen lock can be configured so that whenever the device is turned on or is inactive for a certain amount of time, the user must enter the passcode; there is also context-aware authentication which is using a contextual setting to validate the user; some mobile devices can be configured so that the device automatically unlocks and stays unlocked until a specific action occurs – this is context-aware authentication
Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report covers encryption. What would Hisoka NOT include in his document?
a) all modern versions of mobile device OS encrypt all user data by default
b) encryption occurs when the mobile device is locked
c) Apple uses file-based encryption to offer a higher level of security
d) data backed up to an Apple or Google server could be unlocked by a court order
C - Apple uses file-based encryption to offer a higher level of security
Android OS offers file-based encryption; all the other statements are TRUE
file-based encryption is considered more secure than full disk encryption because with file-based encryption each file is encrypted with a different key so that files can unlocked independently without decrypting an entire partition at once; the device can decrypt and use files needed to boot the system and process critical notifications while not decrypting personal apps and data
What does containerization do?
in regards to using devices that contain personal and business data, containerization can separate storage into business and personal and manage each appropriately; segmenting storage on a mobile device used for both business and personal needs has advantages including helping company avoid data ownership privacy issues and legal concerns regarding a user’s personal data stored on the device; in addition, it allows companies to delete only business data when necessary without touching personal data
What allows a device to be managed remotely?
Mobile Device Management (MDM)
MDM typically involves a server component, which sends out management commands to the mobile devices and a client component, which runs on the mobile device to receive and implement the management commands; an admin can then perform OTA updates or change the configuration on one device, groups of devices or all devices
Which of these is NOT a security feature for locating a lost or stolen mobile device?
a) remote lockout
b) last known good configuration
c) alarm
d) thief picture
B - last known good configuration
this should say last known good location or last known location; all the others are security features for locating lost or stolen mobile devices