Security Operations: Examining security for mobile devices Flashcards

1
Q

What involves in Managing mobile-device security?

A

With organizations typically dealing with mobile-device proliferation, mobile device management (MDM) is a method to address device security as it provides centralized management and monitoring of mobile-device security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some of the deployment models?

A

Organizations typically will implement a few different types of deployment models:

Bring your own device (BYOD: A mobile-device deployment model in which employees use their personal devices to access organizational resources.

Corporate-owned, personally enabled (COPE): A mobile-device deployment model in which employees use company-provided devices as personal devices with which they can access organizational resources.

Choose your own device (CYOD): A mobile-device deployment model in which employees use company-provided devices. Typically, there are a limited number of choices to access organizational resources.

COSU – Corporately owned Special Use Device (scanners)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List the basic security techniques for mobile devices?

A

Use strong authentication, including multifactor authenication (MFA).

Security patching./Firmware Updates

Device encryption.

Block jailbroken and rooted devices.

Implement attribute-based access controls, such as conditional access.

Containerization or sandboxing.

Secure encryption protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What connection mobile devices use?

A

Wi-Fi
Cellular
Bluetooth
NFC
VPN’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to secure a cellular communication?

A

Cellular: earth and satellite communications:

Using cellular communications can strengthen the security of communication.- via VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to secure Wi-Fi?

A

Wi-Fi: 802.11x wireless standard:

Public hotspots should be avoided or virtual private network (VPN) software implemented when necessary.

Disable auto-connect.

Verify all Wi-Fi connections are to trusted networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to secure Bluetooth?

A

Bluetooth: 802.15 standard:

Disable these connections if not in use.

Can be exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to secure VPNs?

A

VPNs: Use a combination of tunneling and encryption protocols to protect device communications over untrusted networks. Tunneling protocols include:

Point-to-Point Tunneling Protocol (PPTP): legacy, widely adopted, uses weak encryption.

Secure Socket Tunneling Protocol (SSTP): used in Windows environments, shared a Internet Assigned Numbers Authority (IANA) port number of 443 with HTTPS, making it potentially firewall friendly.

Layer Two Tunneling Protocol (L2TP): Widely adopted VPN tunneling protocol, coupled with strong encryption.

Internet Key Exchange version 2 (IKEv2): Good option for mobile devices, maintains tunnel across unstable connections and is fast, coupled with strong security. (RECOMMENDED TO USE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to secure NFC?

A

Near-field communications:

Short range: 1 to 4 centimeters or 1/2 to 1 1/2 inches.

Commonly used for wireless-payment transactions and small data transfers.

Disabled when not in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly