6.1 Mobile Security (Security Management issues) Flashcards

1
Q

Describe the capabilities of a mobile device

A

Powerful computers & communication devices
Storage processing & other capabilities (location functions, camera / video, calendar, clock)
Very useful tools for work & social activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the possible peculiar permission requests in terms of dangerous permissions?

A
CALL_Phone
GET_Accounts
INSTALL_Packages
MANAGE_Accounts
READ_Contacts
WRITE_Contacts
WRITE_Calendar
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the possible peculiar permission requests in terms of initial findings?

A

Case of security apps
Case of children’s gaming apps
Case of gaming apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the elements of a Feature Phone?

A

Fixed set of features

Handset capabilities can’t be added or improved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the elements of a Smartphone?

A

Capabilities can be improved
Customised via updates
Increases functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Where can (data) evidence be located?

A

Data can be physically stored in 3 different locations (SIM, Handset, Memory Card)
Some types of data can be found in more than 1 location (contacts on SIM & handset, pictures on handset & memory card)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the Identification of mobile security

A

Securing & evaluating the scene (identify all related evidence)

  1. If the device is off, leave it off (remove battery - keep with the phone)
  2. If device is on, leave it on
  3. 1 Switch to airplane mode
  4. 2 Change autolock to never
  5. 3 Use cellular network isolation card to replace SIM card; put device in Faraday bag
  6. 4 Gather all password information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the Preservation of mobile security

A
Mobile technology data = volatile (data can be lost by)
User selective deletion
App/OS updates
Factory reset simple & effective
Remote wipe capability

Deleted data may not be recoverable
Security on the device
Wear levelling of NAND technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the Collection of mobile security

A
Mobile devices need to be identified by the make, model, and service provider
Logical imaging copies active file system (only the allocated data) from device to another file
Physical acquisition creates a bit by bit copy of data storage - used to recover deleted data
Acquisition tools (Paraben (SIM card), Encase, XRY, Oxygen)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly