Section 18.169 Mobile Vulnerabilities and Attacks Flashcards
Objectives 2.2 Explain common threat vectors and attack strategies. Objectives 2.3 Explain various types of vulnerabilities Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 2.6 Given a scenario, you must be able to apply common security techniques to computing resources.
Different Types of Mobile Vulnerabilities
Sideloading
The practice of installing applications on a device from unofficial sources which actually bypasses the devices default app store
● Can introduce malware; download apps from official sources with strict review processes
Mitigation techniques: always download apps from an official and trusted source
Different Types of Mobile Vulnerabilities
Jailbreaking/Rooting
Process that gives users escalated privileges on the device and allows users to circumvent the built in security mesaures by the devices
● Prevents installation of manufacturer updates, leaving devices vulnerable
Greater customisation but less security
Different Types of Mobile Vulnerabilities
Insecure Connection Methods
Using open Wi-Fi networks or pairing with unknown devices over Bluetooth exposes devices to attacks
Mitigation techniques: Use cellular data for more secure connections. Connect only to known devices and set devices to non-discoverable when not pairing
Different Types of Mobile Vulnerabilities
Mobile Device Management (MDM) Solution
Used to conduct patching of the devices by pushing any necessary updates to the devices to ensure that they are always equipped with the latest security patches
Mobile Device Management (MDM) Solution
Patching
Ensuring devices receive necessary security updates
Mobile Device Management (MDM) Solution
Configuration Management
Enforcing standardized configurations for security
Mobile Device Management (MDM) Solution
Best Practice Enforcement
Disabling sideloading, detecting jailbreaking/rooting, and enforcing VPN use