Securing Devices Flashcards
Define Physical Security
The implementation and practice of various control mechanisms that are intended to restrict physical access to facilities and physical assets.
What does BYOD stand for?
Bring your own device
Which devices are permitted to access sensitive data?
- Phones that are either traceable and able to wipe or lock itself after too many failed login attempts
- A specially designated device provided from an organisation.
What type of credentials are required for accessing devices.
*User names and passwords
*security key fobs
*digital certificates
*badges
*other form of credentials in order for you to access devices.
Which device types are acceptable for storing data.
- Encrypted Devices
(Some USB flash drives automatically provide this functionality and can be decrypted when accessed by authorized personnel.)
How to securely erase a device before disposal.
This will depend on the sensitivity of the data and your industry’s regulatory requirements. Even emptying the trash or formatting the drive will still leave traces of files that can be recovered by software or in a laboratory. When erasing a drive or device, use tools that can destroy data at the hardware level, or use physical destruction.
What is digital presence?
sometimes called a digital shadow or an electronic footprint – refers to the trail of data you leave when using the internet.
Can include:
*Browser cache
*Temporarily downloaded files.
*Remnants left on public computers
*Also includes device logs.
*System operations.
*User activity.
*Info revealed from IoT device configuration.
*Also includes cloud storage. You may not be aware your files are synchronized with cloud.
Internet of Things (IoT)
(Internet of Things) The network of physical objects that are embedded with sensors, software, and other technology that enables them to connect to and exchange data with other objects via the Internet or other communication networks.
Maintaining Device Security
Device Usage:
*Ensure your device has not been modified to bypass normal security. E.G. Jailbroken (removing software restrictions)
*Ensure location detection is enabled.
*Ensure remote wipe is enabled.
Maintaining Device Security
Awareness:
*Lock unattended devices.
*Beware of shoulder surfers.
*Never access sensitive data in a public place.
*Be cautious when connecting to public Wi-Fi. Never access sensitive data on a public network
Maintaining Device Security
Passwords and Authentication:
*Set strong PINs/patterns/passwords on your device.
*Be cautious about saving passwords on your device.
Maintaining Device Security
Data:
*Limit sensitive data stored on or accessed by the device.
*Use security mechanisms to protect data on your device. (Permissions and Encryptions)
*Regularly back up data to a secure location.
Maintaining Device Security
Social Media:
Limit the use of social media services or device features that would allow others to track your movements and activities.
Maintaining Device Security
Policy and Procedures:
Follow your organizational policy when using mobile devices or any other device.
Maintaining Device Security
Decommissioning and Disposal:
Securely destroy data on your device before disposal.
Scenario:
You just ended a lunch meeting with a client. After arriving back at your office, you realize your corporate-issued cell phone is missing. You need to decide what to do to minimize the security risk of a lost device.
What is the first step you should take after realizing that the phone is missing?
The first step you should take is to report the missing phone to your organization’s IT personnel.
Scenario:
You just ended a lunch meeting with a client. After arriving back at your office, you realize your corporate-issued cell phone is missing. You need to decide what to do to minimize the security risk of a lost device.
What type of security controls could you or your company put in place to ensure that any information on the phone is protected?
When the phone is issued, your organization may place restrictions on the type of data that can be stored on the phone, as well as if that data is encrypted.
If the phone is lost or stolen, IT personnel may be able to remotely wipe or otherwise secure the data on the phone. From a user perspective, you can help protect the data on the phone by following your organization’s usage policies, as well as uphold general guidelines like using strong passwords.
What is Authentication?
Authentication is the act of you proving your identity, usually to a computer system. There are three basic approaches to authentication.
Comes in one of three factors:
Something you know (Password or Pin)
Something you have (A token)
Something you are (Biometrics - eyes, fingerprints)
What is Single Factor Authentication?
The act of authenticating your identity by using only one factor, such as a password or PIN, that will grant you access if correct.
What is Multi Factor Authentication?
The act of authenticating your identity by using multiple factors, such as a PIN and a one-time code sent to your phone as a SMS.
Multi Factor Authentication requires more than one factor in a different category. (1. From something you know 2. From
something you have).
What is a Password?
Any series of letters, numbers, or special characters used to prove your identity during authentication.
What is a personal identification number (PIN)?
A personal identification number (PIN) is a short numeric password. It’s typically four numbers but it can be longer. The risk of PINs is that they are very short, with a limited set of numbers to choose from. This makes them easier to crack. The longer the PIN, the longer it will take to crack, and the more secure it is.
What is a pattern lock?
A pattern, also known as a pattern lock, is a series of swipes or taps you perform to log in to your device. This can be done by physically tracing the pattern on a touch screen with your finger, or by drawing a pattern using a device like a mouse.
What is ‘Something you have’ authentication method?
Something you have is any authentication method that requires possession of some object in order to use. It does not require memorization or recalling information from a record. The most common object used with this factor is a smartphone. The physical phone itself is usually not the method of entry, but rather the apps that are tied to a specific phone. When a banking site sends you a text message with a one-time use code, also called a token, you are using something you have. The fact that you possess the only phone that should be receiving this text is what fulfils this factor.
What is ‘Something you are’ authentication method?
Something you are is any authentication method that uses your own unique physical traits to prove that you are who you say you are. It is also referred to as biometrics. Unlike the other two factors, you’re not required to know some piece of information, nor are you required to possess some object. There are many biometric methods out there. One of the most common is facial recognition, which analyses the general shape of your face to determine whether or not it’s you.
Others may include:
*Retinal or iris scans (detect minute details in someone’s eyes)
*Fingerprint analysis
Which of the following is an example of using multi-factor authentication?
A. Using a password and a PIN.
B. Using a one-time code from a phone app and a token from a key fob.
C. Using a passphrase and facial recognition.
D. Using an iris scan and fingerprint scan
C.
C is the correct answer because it is the only one that describe two methods from different factors: something you know (passphrase), and something you are (facial recognition).
What strategies can the new hire employ to manage passwords on infrequently used systems?
- A password manager
- Recording passwords in a digital file or physical document
that is maintained under at least as much security as is
appropriate for the most sensitive of the credentials listed - Emailing them to a password-protected email account
Data protection is often spoken of in the context of three main facets. What are they?
Confidentiality, Integrity and Availability.
Confidentiality
The data is only accessible to authorised individuals
- Information is not provided to unauthorised individuals
- Restrict access of the information
- Restrict what can be done with the information
Integrity
The data has not been manipulated or falsified.
- Ensures that the information is accurate, complete and
reliable. - Seeks to protect the information source (Information
cannot be edited/altered by an outside source) – Only can
be edited by authorised users