Section 18.169 Mobile Vulnerabilities and Attacks Flashcards

Objectives 2.2 Explain common threat vectors and attack strategies. Objectives 2.3 Explain various types of vulnerabilities Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 2.6 Given a scenario, you must be able to apply common security techniques to computing resources.

1
Q

Different Types of Mobile Vulnerabilities

Sideloading

A

The practice of installing applications on a device from unofficial sources which actually bypasses the devices default app store

● Can introduce malware; download apps from official sources with strict review processes

Mitigation techniques: always download apps from an official and trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Different Types of Mobile Vulnerabilities

Jailbreaking/Rooting

A

Process that gives users escalated privileges on the device and allows users to circumvent the built in security mesaures by the devices

● Prevents installation of manufacturer updates, leaving devices vulnerable

Greater customisation but less security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Different Types of Mobile Vulnerabilities

Insecure Connection Methods

A

Using open Wi-Fi networks or pairing with unknown devices over Bluetooth exposes devices to attacks

Mitigation techniques: Use cellular data for more secure connections. Connect only to known devices and set devices to non-discoverable when not pairing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Different Types of Mobile Vulnerabilities

Mobile Device Management (MDM) Solution

A

Used to conduct patching of the devices by pushing any necessary updates to the devices to ensure that they are always equipped with the latest security patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mobile Device Management (MDM) Solution

Patching

A

Ensuring devices receive necessary security updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mobile Device Management (MDM) Solution

Configuration Management

A

Enforcing standardized configurations for security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mobile Device Management (MDM) Solution

Best Practice Enforcement

A

Disabling sideloading, detecting jailbreaking/rooting, and enforcing VPN use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly