Securing Mobile Devices Flashcards

1
Q

Screen locks

A
  • Restrict access to the device
  • You’re going to leave it somewhere
  • Fingerprint - Built-in fingerprint reader
  • Face Unlock - Face recognition
  • Swipe - Choose a pattern
  • Passcode - Choose a PIN or add complexity
  • Failed attempts
  • iOS: Erase everything after 10 failed attempts
  • Android: Lock the device and require a Google login
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Locator applications and remote wipe

A
  • Built-in GPS
  • And location “helpers”
  • Find your phone on a map
  • Control from afar
  • Make a sound
  • Display a message
  • Wipe everything
  • At least your data is safe
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Remote backup

A
  • Difficult to backup something that’s always moving
  • Backup to the cloud
  • Constant backup - No manual process
  • Backup without wires - Use the existing network
  • Restore with one click
  • Restores everything
  • Authenticate and wait
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Anti-virus and Anti-malware

A
  • Apple iOS
  • Closed environment, tightly regulated
  • Malware has to find a vulnerability
  • Android
  • More open, apps can be installed from anywhere
  • Easier for malware to find its way in
  • Windows Phone
  • Closed environment
  • Apps run in a “sandbox”
  • You control what data an app can view
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Patching/OS updates

A
  • All devices need updates - Even mobile devices
  • Device patches - Security updates
  • Operating system updates - New features, bug fixes
  • Don’t get behind! - Avoid security problems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Biometric authentication

A
  • Multi-factor authentication
  • More than one factor
  • Passcode, password, swipe pattern
  • Fingerprint, face, iris
  • A phone is always with you
  • And you’re a good source of data
  • We’re just figuring this out
  • Biometrics have a long way to go
  • Use as many factors as necessary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authenticator apps

A
  • Pseudo-random token generators
  • A useful authentication factor
  • Carry around physical token devices
  • Where are my keys again?
  • You’re carrying your phone around
  • And it’s pretty powerful
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Trusted vs. untrusted sources

A
  • Once malware is on a phone, it has a huge amount of access
  • Don’t install APK files from an untrusted source

• iOS
• All apps are curated by
Apple

  • Android
  • Apps can be downloaded from
  • Google Play or sideloaded
  • This is where problems can occur
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewalls

A
  • Mobile phones don’t include a firewall
  • Most activity is outbound, not inbound
  • Some mobile firewall apps are available
  • Most for Android
  • None seem to be widely used
  • Enterprise environments can control mobile apps
  • Firewalls can allow or disallow access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Policies and procedures

A
  • Manage company-owned and user-owned mobile devices
  • BYOD - Bring Your Own Device
  • Centralized management of the mobile devices
  • Specialized functionality
  • Set policies on apps, data, camera, etc.
  • Control the remote device
  • The entire device or a “partition”

• Manage access control
• Force screen locks and PINs on these single user
devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the name of a policy that allows employees to use private mobile devices for accessing company’s restricted data and applications?

A

BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In which of the mobile device deployment models employees can use corporate-owned devices both for work-related tasks and personal use?

A

COPE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Allowing “Unknown Sources” in Android security settings enables:

A

Sideloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The practice of installing mobile apps from untrusted sources (i.e. websites and app stores other than the official marketplaces) is called:

A

Sideloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly