2.3 Mobile and Small Form Factor Devices Flashcards

Analyze scenario to integrate security controls for mobile and small form factor devices to meet security requirements

1
Q

(Enterprise Mobility Management)

A

Centralized approach to management provides a consistent and comprehensive way of locking down devices to meet security polisies and compliance requirements while still allowing users to be productive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(Enterprise Mobility Management)

containerization

A

isolates corporate data into protected and encrypted container stored on the mobile device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(Enterprise Mobility Management)

Configuration profiles and payloads

A
  • Configuration profiles are groups of OS and application setting applieed to various devices inside and outside of an enterprise
  • Payloads are the individual settings in the configuration profiles
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(Enterprise Mobility Management)

POCE

A

Personally Owned, Corporate Enabled

-BYOD but with official enterprise onboarding requirements to ensure the device is properly managed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(Enterprise Mobility Management)

Application Wrapping

A

additional sedurity features added to a mobile appplication that do not modify the underlying functionality of the application itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(Enterprise Mobility Management)

Remote assistance access

A

permits helpers to access the user;s device screen, observe settings, and monitor performance, intsall or remove applications, set up email, and configure VPN or wifi services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(Enterprise Mobility Management)

VNC

A

Graphical desktop sharing tool that permits remote management of other devices.
-Uses Remote Frame Buffer (RFB) protocol for remote assistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(Enterprise Mobility Management)

MDM

A

Mobile device management
-often have the ability to create application configuration policies that may permit deployment of applications to include custom configurations and security options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(Enterprise Mobility Management)

Over-the-air Updates

A

centralized and wireless distribution of new software, firmware, certificates, and encryption keys to mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(Enterprise Mobility Management)

Remote Wiping

A

process of sending a signal to a remote device to erase specified data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(Enterprise Mobility Management)

SCEP

A

Simple Certificate Enrollment Protocol

-provides an easy process for network equipment, software, and mobile devices to enroll in digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(Enterprise Mobility Management)

BYOD

A

Bring Your Own Device
-allows employees to bring in their own personal devices such as laptops, smartphones, and tablets to work in order to access enterprise applications and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(Enterprise Mobility Management)

COPE

A

Corporate Owned, Personally Enabled

-company purchases and owns the device and lets employees use them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(Enterprise Mobility Management)

VPN

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(Enterprise Mobility Management)

Application Permissions

A

applications require permissions to use cameras, microphones, call logs, email, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(Enterprise Mobility Management)

Side Loading

A

process of installing applications from sources outside of the app store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

(Enterprise Mobility Management)

unsigned apps/system apps

A

Official apps are digitally singed for their legitimacy by the application developer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

(Enterprise Mobility Management)

context-aware management

A

applies restrictive policies to mobile devices based on certain device conditions like location or time of day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

(Enterprise Mobility Management)

Context Aware management - Geolocation

A

process of determining a devices location by using GPS devices or cell towers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

(Enterprise Mobility Management)

Context- aware management - User behavior

A

can detect when a user’s behavior on a device deviates from a norm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

(Enterprise Mobility Management)

Context-aware management - time based restrictions

A

applies certain security controls on a device based on the time of day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

(Security implications/privacy concerns)

Removable storage

A

built into mobile devices such as smartphones and tablets and cannot be removed

23
Q

(Security implications/privacy concerns)

cloud storage

A

used for backing up a mobile device settings, application data, photos, and videos, purchase history

24
Q

(Security implications/privacy concerns)

Transfer/Data Storage

A

free cloud services provide basic services such as free storage, file management recycle bin, content sharing but does not allow much control over the actual storage

25
Q

(Security implications/privacy concerns)

USB OTG

A

USB devices to ‘host’ other USB devices

26
Q

(Security implications/privacy concerns)

Device loss/theft

A

mobile devices are prone to theft or being forgotten

27
Q

(Security implications/privacy concerns)

Harward andti-tamper

A

resist deliberate attempts at cousing disruption to or malfunction of a device

28
Q

(Security implications/privacy concerns)

eFuse

A

supports reprogramming of a computer chip’s programming if adverse conditions, such as tampering, are detected.

29
Q

(Security implications/privacy concerns)

TPM

A

Trusted Platform Module
-built into most motherboards to generate and store encryption keys in order to provide root of trust capabilities for devices using encrypted hard drives

30
Q

(Security implications/privacy concerns)

Rooting

A

grants root-level privileges to android OS

31
Q

(Security implications/privacy concerns)

Jailbreaking

A

the process of removing certain security restrictions from iOS devices such as iPhones and iPads

32
Q

(Security implications/privacy concerns)

Push notification services

A

important messages sent to mobile devices by an application publisher or an enterprise MDM

33
Q

(Security implications/privacy concerns)

Geotagging

A

proccess of attaching geographically related information to common media types such as pictures, videos, SMS messages, and even websites

34
Q

(Security implications/privacy concerns)

Encrypted instant messaging apps

A

instant messaging applications can be encrypted to protect from packet sniffers

35
Q

(Security implications/privacy concerns)

tokenization

A

the process of using a non-sensitive value (token) as a substitute for the original sensitive value (credit card number)

36
Q

(Security implications/privacy concerns)

OEM/carrier android fragmentation

A

the wide disparity of android versions still in use due to older android devices being prevented by google from updating to the latest android version

37
Q

(Security implications/privacy concerns)

Mobile Payment

A

using smartphones and smart watches to submit mobile payments via their mobile devices payment appications

38
Q

(Security implications/privacy concerns)

inductance-enabled

A

NFC antennas use inductance by a wrapped coil of to generate a very small magnetic field. This can create a connection between two devices

39
Q

(Security implications/privacy concerns)

mobile wallet

A

virtual wallets that store payment card information on mobile devices

40
Q

(Security implications/privacy concerns)

peripheral-enabled payments

A

involve attaching credit card readers to smartphones in order to process credit cards

41
Q

(Security implications/privacy concerns)

Tethering

A

process of sharing a wireless connection to other devices via the wifi, USB, or bluetooth protocol

42
Q

(Security implications/privacy concerns)

authentication

A

mobile devices have multiple authentication methods to choose from including

  • swipe pattern
  • gesture
  • pin code
  • biometrics
43
Q

(Security implications/privacy concerns)

Malware

A

mobile devices are inherently more resistant to malware that PCs since mobile OSs place users behind restricted sandboxes

44
Q

(Security implications/privacy concerns)

Unauthorized domain bridging

A

when unauthorized wi-fi users connect through the dual-network-connected employee to reach the corporate wired network.

45
Q

(Security implications/privacy concerns)

baseband radio/SOC

A

hybrid CPU/RAM/firmware chip on mobile devices that handles its cellular radio connections

46
Q

(Security implications/privacy concerns)

Augmented reality

A

enhances or augments your real world by adding auditory, visual, haptic, and other digital sensory elements so that it feels like new environmental elements have been physically added into your current space.

47
Q

(Security implications/privacy concerns)

SMS/MMS/messaging

A

SMS/MMS messages are generally unencrypted

48
Q

(Wearable Technology)

Devices

A
  • cameras
  • watches
  • fitness devices
  • medical sensors/devices
  • headsets
49
Q

(Wearable Technology)

Encrypted and unencrypted communications concerns

A

minimize/stop the use of wearables if it does not support encrypted communications

50
Q

(Wearable Technology)

physical reconnaissance

A

when attacker use wearable technology to gather information about an environment or its people

51
Q

(Wearable Technology)

Personal data theft

A

when attackers remotely pair with a device and extract its data

52
Q

(Wearable Technology)

health privacy

A

fitness devices, particularly medical devices, can generate, store, and transmit electronic health information about their owners

53
Q

(Wearable Technology)

Data forensics of collected data

A

practice of collecting, preserving, and analyzing digital evidence in order to understand all aspects of a digital crime