Module 5 - Mobile, Embedded, & Specialized Device Security Flashcards
What are examples of types of mobile devices?
Tablets, Smartphones, Wearables, Portable computers (Laptop, Notebook, Subnotebook, 2-1, Web-based computer)
What are some mobile device core features?
1) Small form factor
2) Mobile OS
3) Wireless data network interface for accessing the Internet, such as Wi-Fi or cellular telephony
4) Stores or other means of acquiring applications (apps)
5) Local nonremovable data storage
6) Data synchronization capabilities w/ a separate computer or remote servers
What are Additional Features of the Core Feature “Small form factor”?
Global Positioning System (GPS)
What are Additoinal Features of the Core Feature “Mobile OS”?
Microphone and/or digital camera
What are Additional Features of the Core Feature “Wireless dat network interface for accessing the Internet, such as Wi-Fi or cellular telephony”?
Wireless cellular connection for voice communications
What are the Additional Features of the Core Feature “Stores of other means of acquiring applications (apps)”?
Wireless personal area network interfaces such as Bluetooth or near field communications (NFC)
What are the Additional Features of the Core Feature “Local nonremovable data storage”?
Removable storage media
What are the Additional Features of the Core Feature “Data synchronization capabilities w/ a separate computer or remote servers”?
Support for using the device itself as removable storage for another computing device
What are some Mobile Device Connectivity Methods (4)?
1) Cellular
2) Wi-Fi
3) Infrared
4) USB Connections
What is “Cellular”?
- coverage area for a cellular telephony network is divided into cells
Hexagon-shaped cells measure 10 square miles
Transmitters are connected through a mobile telecommunications switching office (MTSO) that controls all of the transmitters in the cellular network
What is “Wi-Fi”?
A wireless local area network (WLAN) designed to replace or supplement a wired local area network (LAN)
What is “Infrared”?
- uses light instead of radio frequency (RF) as the communication media
Due to slow speed & other limitations, infrared capabilities are rarely found today
Next to visible light on the light spectrum &, although invisible, has many of the same characteristics of visible light
At one time, infrared data ports were installed on laptop computers, printers, cameras, watches, & other devices so data could be exchanged using infrared light
What are “USB Connections”?
These include standard-size connectors, mini-connectors, & micro connectors
Universal Serial Bus (USB) – used for data transfer
What is “Bring your own device (BYOD”?
Allows users to use their own personal mobile devices for business purposes
What is “Corporate owned, personally enabled (COPE)”?
Employees choose from a selection of company approved devices
What is “Choose your own device (CYOD)”?
Employees choose from a limited selection of approved devices, but the employee pays the upfront cost of the device while the business owns the contract
What is “Virtual desktop infrastructure”?
Storing sensitive applications & data on a remote server that is accessed through a smartphone
What is “Corporate owned”?
A mobile device that is purchased & owned by the enterprise
What are some Enterprise Deployment Models (5)?
1) Bring your own device (BYOD)
2) Corporate owned, personally enabled (COPE)
3) Choose your own device (CYOD)
4) Virtual desktop intrastructure (VDI)
5) Corporate owned
What are benefits of BYOD, COPE, & CYOD models for the enterprise (6)?
1) Management flexibility
2) Less oversight
3) Cost savings
4) Increased employee performance
5) Simplified IT infrastructure
6) Reduced internal service
What do user benefits include (3)?
1) Choice of device
2) Choice of carrier
3) Convenience
What are security risks associated w/ using mobile devices (3)?
1) Mobile device vulnerabilities
2) Connection vulnerabilities
3) Accessing untrusted content
What are some Mobile Device Vulnerabilities?
1) Physical security
2) Limited updates
3) Location tracking
4) Unauthorized recording
What are the 2 dominant OSs for mobile devices?
1) Apple
2) Google
What is a Physical Security mobile device vulnerability?
Mobile devices are frequently lost or stolen
What is a Limited Updates mobile device vulnerability?
Security patches & updates for mobile OSs are distributed through firmware over-the-air (OTA) updates
What is a Location Tracking mobile device vulnerability?
Mobile devices w/ GPS capabilities typically support geolocation
What is an Unauthorized Recording mobile vulnerability?
By infecting a device w/ malware, a threat actor can spy on an unsuspecting victim & record conversations or videos
What are some Connection Vulnerabilities (4)?
1) Tethering
2) USB On-the-Go (OTG)
3) Malicious USB cable
4) Hotspots
Description/Vulnerability of Tethering as a Connection Vulnerability.
Description:
A mobile device w/ an active Internet connection can be used to share that connection w/ other mobile devices through Bluetooth or Wi-Fi
Vulnerability:
An unsecured mobile device may infect other tethered mobile devices or the corporate network