Section 5 - Mobile Device Security Flashcards

1
Q

There’s two main things ways we connect wireless devices. They are…?

A

Bluetooth
Wifi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If we’re using Wifi we want to make sure we’re protecting it at the highest level. This can be done using what?

A

WPA2

Wifi Protected Access 2 is a advanced encryption standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do you protect your mobile device from mobile malware?

A
  1. Have an antivirus solution on your device
  2. Make sure your mobile device is patched and updated
  3. Make sure you’re updating your OS
  4. Only install applications from an offical app store
  5. Be careful of the sites you visit and the thing you click on
  6. Do not jailbreak or root your device. This bypasses the natural protections that your system has
  7. Don’t use custom firmware or ROM (this is specific to Android users) you’re using an alternate version of the operating system that makes it difficult for the manufacturer to send patches to you
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is important to remember regarding updating operating systems for Androids?

A

Unlike iPhone who will send out a push notification when there’s available updates and patches (thus ensuring you have the latest OS) Android is more complicated. Google puts out the base operating system and when there’s a vulnerability, they create patches for it and send it out to their different manufacturers. However, since most people are using a Google-based Android device (most people use Samsung, for instance) those patches could take several months before they are available to your specific device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does SIM stand for?

A

Subscriber Identity Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a SIM card do?

A

This is an integrated circuit that securely stores the international mobile subscriber identity, your IMSI number and it’s related key.

** This is what tells the cellphone towers which device is assigned to which number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is SIM cloning?

A

SIM cloning allows two cellphones to utilize the same service and allows the attacker to gain access to the phone’s personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can you prevent identify theft or account takeover?

A

Be careful where you post your phone number

*** If you are a victim of a data breach, and somebody has stolen your name and your address and your email, and now they have your phone number, they can perform this account takeover against you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is bluejacking?

A

Bluejacking is sending unsolicited messages to bluetooth enabled devices

*** This often happens by having somebody who will pair to your device and then send the data to you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is bluesnarfing?

A

Unauthorized access of information from a wireless device over a Bluetooth connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between bluejacking and bluesnarfing?

A

Bluejacking SENDS information to a device

Bluesnarfing TAKES information from a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the discoverable mode on bluetooth do?

A

It will sit there and wait to accept connections from any device that comes in the area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the best way to defend your mobile device?

A

Full disk encryption

Set up tracking on your device

do not jailbreak or root your phone

use a secure web browser (such as chrome as opposed to a third-party web browser hardly anyone knows)

always use the secure version of a website (this is denoted by the https at the front of the web address. This will ensure you have TLS tunnel created between your phone and the server.)

turn off location services for any apps that don’t need it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the best way to assure you don’t get malware from an app?

A

only install applications from an official mobile store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the following called?

APPLE - This means you’re going to remove the security protections that has put in place so that you can it from your wireless carrier to a different wireless carrier or install third-party apps outside of the App store

ANDROID - This allows you to have administrative permissions over it. You can install whatever applications you want and make the phone do things that it wasn’t necessarily designed to do.

A

Jailbreaking (Apple)
Rooting (Android)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is TLS?

A

Transport Layer Security

This puts an encryption layer and a tunnel between your device and the server to ensure you have confidentiality and nobody is conducting a man-in the middle attack from you

17
Q

What is MDM?

A

Mobile Device Management

A centralized software solution that allows your system administrators to create and enforce policies across all of the mobile devices

*** May be something to consider if your organization is going to be providing their employees with a cellphone

18
Q

What is geotagging?

A

Embedding the geolocation coordinates or GPS coordinates into a piece of data

*** This is most commonly done with a photo or a video. By default, when you take a picture, your GPS coordinates are embedded into that photo as metadata. This allows for your coordinates to be found if you were to post that photo to a social media platform.

19
Q

When it comes to BYOD many companies will do what as a means to protect their assets from malware risk?

A

Storage Segmentation

Creating a clear separation between personal and company data on a single device

*** For example, having two emails - one for personal and one for email.

20
Q

What is MDM?

A

Mobile Device Management

Centralized software solution for remote administration and configuration of mobile devices

*** With this, you are able to push out software policies, prevent installing application and install updates remotely without the user knowing.

21
Q

An alternative that a lot of companies have to BYOD is…?

A

CYOD

Choose Your Own Device

This gives employees the choice of a phone and the company will pay for it. Then they will install MDM on it to make sure it is safe to use.

22
Q

What is DLP?

A

Data Loss Prevention

23
Q

What is mobile device hardening?

A

Increasing the security of your mobile device

24
Q

What are the best ways to conduct mobile device hardening?

A
  1. Update your device to the latest version of the software
  2. Install AntiVirus
  3. Train users on proper security and use of the device
  4. Only install applications from official mobile stores
  5. Do not jailbreak or root your device
  6. Only use v2 SIM cards with your devices (v1 is very suspectible to SIM cloning)
  7. Turn off all unnecessary features
  8. Turn on encryption for voice and data
  9. Use strong passwords and/or biometrics
  10. Don’t allow BYOD