Securing Mobile Devices Flashcards

1
Q

Screen locks - Securing Mobile Devices

A
  • Fingerprint - Built-in fingerprint reader
  • Face Unlock - Face recognition
  • Swipe - Choose a pattern
  • Passcode - Choose a PIN or add complexity
  • Failed attempts:
    • iOS: Erase everything a er 10 failed attempts
    • Android: Lock the device and require a Google login
    • Windows Phone: Delays next attempt or factory reset
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Locator applications and remote wipe - Securing Mobile Devices

A
  • Built-in GPS - And location “helpers”
  • Find your phone on a map
  • Control from afar with sounds and messages
  • Wipe everything remotely
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Remote backup - Securing Mobile Devices

A
  • Difficult to backup something that’s always moving
  • Backup to the cloud for constant backup
  • Backup without wires - use the existing network
  • Restore with one click - authenticate and wait
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Antivirus and Antimalware - Securing Mobile Devices

A
  • Apple iOS - Closed environment, tightly regulated
  • Android - More open, apps can be installed from anywhere
  • Windows Phone - Closed environment, apps run in a sandbox
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Patching/OS updates - Securing Mobile Devices

A
  • All devices need updates, even mobile devices
  • Device patches - security updates
  • Operating system updates - New features, bug fixes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Biometric authentication - Securing Mobile Devices

A
  • Multi-factor authentication - More than one factor
  • Passcode, password, swipe pattern
  • Fingerprint, face, iris
  • A phone is always with you, and you’re a good source of data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authenticator apps - Securing Mobile Devices

A
  • Pseudo-random token generators
  • Carry around physical token devices
  • Use a token generator app
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Full device encryption - Securing Mobile Devices

A

• Encrypt all device data - Phone keeps the key
• iOS 8 and later - Personal data is encryption with your passcode
• Android - Full device encryption can be turned on
• Windows Phone 8/8.1 - Full device encryption only available
with Exchange ActiveSync or managed by an MDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trusted vs. untrusted sources - Securing Mobile Devices

A
  • Once malware is on a phone, it has a huge amount of access
  • iOS - All apps are curated by Apple
  • Android - Downloaded from Google Play or sideloaded
  • Windows Phone - Apps are curated by Microsoft
    • Sideloading available in enterprise environments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Firewalls - Securing Mobile Devices

A
  • Mobile phones don’t include a firewall
  • Some mobile firewall apps are available, most for Android
  • Enterprise environments can control mobile apps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Policies and procedures - Securing Mobile Devices

A
  • Manage company-owned and user-owned mobile devices
  • BYOD - Bring Your Own Device
  • Set policies on apps, data, camera, etc.
  • Force screen locks and PINs on these single user devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly