Security Operations: Examining security for mobile devices Flashcards
What involves in Managing mobile-device security?
With organizations typically dealing with mobile-device proliferation, mobile device management (MDM) is a method to address device security as it provides centralized management and monitoring of mobile-device security.
What are some of the deployment models?
Organizations typically will implement a few different types of deployment models:
Bring your own device (BYOD: A mobile-device deployment model in which employees use their personal devices to access organizational resources.
Corporate-owned, personally enabled (COPE): A mobile-device deployment model in which employees use company-provided devices as personal devices with which they can access organizational resources.
Choose your own device (CYOD): A mobile-device deployment model in which employees use company-provided devices. Typically, there are a limited number of choices to access organizational resources.
COSU – Corporately owned Special Use Device (scanners)
List the basic security techniques for mobile devices?
Use strong authentication, including multifactor authenication (MFA).
Security patching./Firmware Updates
Device encryption.
Block jailbroken and rooted devices.
Implement attribute-based access controls, such as conditional access.
Containerization or sandboxing.
Secure encryption protocol
What connection mobile devices use?
Wi-Fi
Cellular
Bluetooth
NFC
VPN’s
How to secure a cellular communication?
Cellular: earth and satellite communications:
Using cellular communications can strengthen the security of communication.- via VPN
How to secure Wi-Fi?
Wi-Fi: 802.11x wireless standard:
Public hotspots should be avoided or virtual private network (VPN) software implemented when necessary.
Disable auto-connect.
Verify all Wi-Fi connections are to trusted networks.
How to secure Bluetooth?
Bluetooth: 802.15 standard:
Disable these connections if not in use.
Can be exploited.
How to secure VPNs?
VPNs: Use a combination of tunneling and encryption protocols to protect device communications over untrusted networks. Tunneling protocols include:
Point-to-Point Tunneling Protocol (PPTP): legacy, widely adopted, uses weak encryption.
Secure Socket Tunneling Protocol (SSTP): used in Windows environments, shared a Internet Assigned Numbers Authority (IANA) port number of 443 with HTTPS, making it potentially firewall friendly.
Layer Two Tunneling Protocol (L2TP): Widely adopted VPN tunneling protocol, coupled with strong encryption.
Internet Key Exchange version 2 (IKEv2): Good option for mobile devices, maintains tunnel across unstable connections and is fast, coupled with strong security. (RECOMMENDED TO USE)
How to secure NFC?
Near-field communications:
Short range: 1 to 4 centimeters or 1/2 to 1 1/2 inches.
Commonly used for wireless-payment transactions and small data transfers.
Disabled when not in use