Module 5 - Mobile, Embedded, & Specialized Device Security Flashcards

1
Q

What are examples of types of mobile devices?

A

Tablets, Smartphones, Wearables, Portable computers (Laptop, Notebook, Subnotebook, 2-1, Web-based computer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some mobile device core features?

A

1) Small form factor
2) Mobile OS
3) Wireless data network interface for accessing the Internet, such as Wi-Fi or cellular telephony
4) Stores or other means of acquiring applications (apps)
5) Local nonremovable data storage
6) Data synchronization capabilities w/ a separate computer or remote servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Additional Features of the Core Feature “Small form factor”?

A

Global Positioning System (GPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Additoinal Features of the Core Feature “Mobile OS”?

A

Microphone and/or digital camera

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Additional Features of the Core Feature “Wireless dat network interface for accessing the Internet, such as Wi-Fi or cellular telephony”?

A

Wireless cellular connection for voice communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the Additional Features of the Core Feature “Stores of other means of acquiring applications (apps)”?

A

Wireless personal area network interfaces such as Bluetooth or near field communications (NFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the Additional Features of the Core Feature “Local nonremovable data storage”?

A

Removable storage media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the Additional Features of the Core Feature “Data synchronization capabilities w/ a separate computer or remote servers”?

A

Support for using the device itself as removable storage for another computing device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some Mobile Device Connectivity Methods (4)?

A

1) Cellular
2) Wi-Fi
3) Infrared
4) USB Connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is “Cellular”?

A
  • coverage area for a cellular telephony network is divided into cells
     Hexagon-shaped cells measure 10 square miles
     Transmitters are connected through a mobile telecommunications switching office (MTSO) that controls all of the transmitters in the cellular network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is “Wi-Fi”?

A

A wireless local area network (WLAN) designed to replace or supplement a wired local area network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is “Infrared”?

A
  • uses light instead of radio frequency (RF) as the communication media
     Due to slow speed & other limitations, infrared capabilities are rarely found today
     Next to visible light on the light spectrum &, although invisible, has many of the same characteristics of visible light
     At one time, infrared data ports were installed on laptop computers, printers, cameras, watches, & other devices so data could be exchanged using infrared light
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are “USB Connections”?

A

These include standard-size connectors, mini-connectors, & micro connectors
 Universal Serial Bus (USB) – used for data transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is “Bring your own device (BYOD”?

A

Allows users to use their own personal mobile devices for business purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is “Corporate owned, personally enabled (COPE)”?

A

Employees choose from a selection of company approved devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is “Choose your own device (CYOD)”?

A

Employees choose from a limited selection of approved devices, but the employee pays the upfront cost of the device while the business owns the contract

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is “Virtual desktop infrastructure”?

A

Storing sensitive applications & data on a remote server that is accessed through a smartphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is “Corporate owned”?

A

A mobile device that is purchased & owned by the enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are some Enterprise Deployment Models (5)?

A

1) Bring your own device (BYOD)
2) Corporate owned, personally enabled (COPE)
3) Choose your own device (CYOD)
4) Virtual desktop intrastructure (VDI)
5) Corporate owned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are benefits of BYOD, COPE, & CYOD models for the enterprise (6)?

A

1) Management flexibility
2) Less oversight
3) Cost savings
4) Increased employee performance
5) Simplified IT infrastructure
6) Reduced internal service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What do user benefits include (3)?

A

1) Choice of device
2) Choice of carrier
3) Convenience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are security risks associated w/ using mobile devices (3)?

A

1) Mobile device vulnerabilities
2) Connection vulnerabilities
3) Accessing untrusted content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are some Mobile Device Vulnerabilities?

A

1) Physical security
2) Limited updates
3) Location tracking
4) Unauthorized recording

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the 2 dominant OSs for mobile devices?

A

1) Apple
2) Google

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a Physical Security mobile device vulnerability?

A

Mobile devices are frequently lost or stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a Limited Updates mobile device vulnerability?

A

Security patches & updates for mobile OSs are distributed through firmware over-the-air (OTA) updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a Location Tracking mobile device vulnerability?

A

Mobile devices w/ GPS capabilities typically support geolocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is an Unauthorized Recording mobile vulnerability?

A

By infecting a device w/ malware, a threat actor can spy on an unsuspecting victim & record conversations or videos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are some Connection Vulnerabilities (4)?

A

1) Tethering
2) USB On-the-Go (OTG)
3) Malicious USB cable
4) Hotspots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Description/Vulnerability of Tethering as a Connection Vulnerability.

A

Description:
A mobile device w/ an active Internet connection can be used to share that connection w/ other mobile devices through Bluetooth or Wi-Fi

Vulnerability:
An unsecured mobile device may infect other tethered mobile devices or the corporate network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Description/Vulnerability of USB On-the-Go (OTG) as a Connection Vulnerability.

A

Description:
An OTG mobile device w/ a USB connection can function as either a host (to which other devices may be connected such as a USB flash drive)

Vulnerability:
Connecting a malicious flash drive infected w/ malware to a mobile device could result in an infection, just as using a device as a peripheral while connected to an infected computer could allow malware to be sent to the device

32
Q

Description/Vulnerability of Malicious USB Cable as a Connection Vulnerability.

A

Description:
A USB cable could be embedded w/ a Wi-Fi controller that can receive commands from a nearby device to send malicious commands to the connected mobile device

Vulnerability:
The device will recognize the cable as a Human Interface Device (similar to a mouse or keyboard), giving the attacker enough permissions to exploit the system

33
Q

Description/Vulnerability of Hotspots as a Connection Vulnerability.

A

Description:
A hotspot is a location where users can access the Internet w/ a wireless signal

Vulnerability:
Because public hotspots are beyond the control of the organization, attackers can eavesdrop on the data transmissions & view sensitive information

34
Q

How do users circumvent the built-in installation on their smartphone?

A

Jailbreaking - Apple
Rooting - Android

35
Q

What are the 3 types of text messaging?

A

1) SMS - text message up to 160 characters
2) MMS - text message w/ pictures, video, audio
3) RCS - can convert a texting app into a live chat platform

36
Q

What are configurations that should be considered when setting up a mobile device for use?

A

1) Strong Authentication
2) Managing Encryption
3) Segmenting Storage
4) Enabling Loss or Theft Services

37
Q

What are 5 ways to use Strong Authentication?

A

1) A passcode
2) A PIN
3) A fingerprint
4) A pattern connecting dots to unlock the device
5) A screen lock

38
Q

What are some Android Smart Lock Configuration Options?

A

1) On-body detection
2) Trusted Places
3) Trusted Devices
4) Trusted Face
5) Trusted Voice

39
Q

What does it mean to “Segment Storage”?

A

Separates business data from personal data on mobile devices

Users can apply containerization to separate storage into business & personal “containers”

40
Q

What are 5 Security Features for Locating Lost or Stolen Mobile Devices?

A

1) Alarm
2) Last known location
3) Locate
4) Remote lockout
5) Thief picture

41
Q

What are 4 Mobile Management Tools?

A

1) Mobile Device Management (MDM)
2) Mobile Application Management (MAM)
3) Mobile Content Management (MCM)
4) Unified Endpoint Management (UEM)

42
Q

What is Mobile Device Managment?

A

Tools allow a device to be managed remotely by an organization

  • Typically involves a server, which sends out management commands to the mobile devices, & a client component, which runs on the mobile device to receive & implement the management commands
43
Q

What is Mobile Application Management?

A

Covers application management, which comprises the tools & services responsible for distributing & controlling access to apps

  • The apps can be internally developed or commercially available
44
Q

What is Mobile Content Management?

A

Supports the creation & subsequent editing & modification of digital content by multiple employees

  • Tunes to provide content management to hundreds or even thousands of mobile devices used by employees in an enterprise
45
Q

What are the 4 things Mobile Content Management (MCM) can include?

A

1) Tracking editing history
2) Version control
3) Indexing
4) Searching

46
Q

What is Unified Endpoint Management (UEM)?

A

A group or class of software tools w/ a single management interface for mobile devices as well as computer devices

  • It provides capabilities for managing & securing mobile devices, applications, & content
47
Q

What are the 5 Categories of Embedded & Specialized Devices?

A

1) Hardware & software
2) Specialized systems
3) Industrial systems
4) Other devices
5) IoT devices

48
Q

What is the Raspberry Pi?

A

A low-cost, credit-card-sized computer motherboard

  • Can perform almost any task that a standard computer can & can be used to control a specialized device
49
Q

What is the Arduino?

A

A controller for other devices

  • Has 8-bit microcontroller, limited amount of RAM, no OS
50
Q

What is a Field-Programmable Gate Array (GPFA)?

A

A hardware “chip” that can be programmed by the user to carry out one or more logical operations

51
Q

What is a System on a Chip (SoC)?q

A

Combines all the required electronic circuits of the various computer components on a single chip

  • An OS specifically designed for an SoC is an embedded or specialized system
52
Q

What is an Embedded System?

A

Computer hardware & software contained within a larger system that is designed for a specific function

  • Receive a large amount of data very quickly
53
Q

What are 4 kinds of Specialized Systems & what do they use?

A

1) Utilities
2) Medical systems
3) Aircraft
4) Vehicles

Smart meter.

54
Q

What are 4 actions of Meters (Analog vs Smart)?

A

1) Meter readings
2) Servicing
3) Tamper protection
4) Emergency communication

55
Q

Analog vs Smart Meters of Meter Reading.

A

Analog:
Employee must visit the dwelling each month to read the meter

Smart:
Meter readings are transmitted daily, hourly, or even by the minute to the utility company

56
Q

Analog vs Smart Meters of Servicing.

A

Analog:
Annual servicing is required in order to maintain accuracy

Smart:
Battery replacement every 20 years

57
Q

Analog vs Smart Meters of Tamper Protection.

A

Analog:
Data must be analyzed over long periods to identify anomalies

Smart:
Can alert utility in the event of tampering or theft

58
Q

Analog vs Smart Meters of Emergency Communication.

A

Analog:
None available

Smart:
Transmits “last gasp” notification of a problem to utility company

59
Q

What are Industrial Control Systems?

A

Systems that control locally or remote locations by collecting, monitoring, & processing real-time data to control machines

60
Q

What are Industrial Control Systems managed by?

And what do they help do?

A

1) Managed by supervisory control & data acquisition (SCADA) systems
2) Help to maintain efficiency & provide information on issues to help reduce downtime

61
Q

What is a Supervisory Control & Data Acquisition (SCADA) System?

A

A system that controls multiple industrial control systems (ICS)

62
Q

What are drones used for?

A

1) Policing & surveillance
2) Product deliveries
3) Aerial photography
4) Infrastructure inspections
5) Drone racing

63
Q

What are examples of “Other Specialized Systems”?

A

1) HVAC
2) Multifunctional printer (MFP)
3) Unmanned aerial vehicle (UAV) aka drone
4) Voice over IP (VoIP)

64
Q

What is the Internet of Things (IoT)?

A

Any device to the Internet for the purpose of sending & receiving data to be acted upon

65
Q

What is an example of IoT where it’s related to the body?

A

Body area networks (BAN) - network system of IoT devices in close proximity to a person’s body that cooperate for the benefit of the user

Managed body sensor network (MBSN) - when readings are transmitted via computer or smartphone to a third-party physician who can make decisions regarding any medications to prescribe or lifestyle changes to recommend

Autonomous body sensor network (ABSN) - introduces actuators in addition to the sensors so that immediate effects can be made on the human body

66
Q

What are 10 Security Constaints for Embedded Systems & Specialized Devices?

A

1) Power
2) Compute
3) Network
4) Cryptography
5) Inability to patch
6) Authentication
7) Range
8) Cost
9) Implied trust
10) Weak defaults

67
Q

How is Power a Security Constraint?

A

To prolong battery life, devices, & systems are optimized to draw very low levels of power & thus lack the ability to perform strong security measures

68
Q

How is Compute a Security Constraint?

A

Due to their size, small devices typically possess low processing capabilities, which restricts complex & comprehensive security measures

69
Q

How is Network a Security Constraint?

A

To simplify connecting a device to a network, many device designers support network protocols that lack advanced security features

70
Q

How is Cryptography a Security Constraint?

A

Encryption & decryption are resource-intensive tasks that require significant processing & storage capacities that these devices lack

71
Q

How is Inability to Patch a Security Constraint?

A

Few, if any, devices have been designed w/ the capacity for being updated to address exposed security vulnerabilities

72
Q

How is Authentication a Security Constraint?

A

To keep costs at a minimum, most devices lack authentication features

73
Q

How is Range a Security Constraint?

A

Not all devices have long-range capabilities to access remote security updates

74
Q

How is Cost a Security Constraint?

A

Most developers are concerned primarily w/ making products as inexpensive as possible, which means leaving out all security protections

75
Q

How is Implied Trust a Security Constraint?

A

Many devices are designed w/o any security features but operate on an “implied trust” basis that assumes all other devices or users can be trusted

76
Q
A