3.5 Given a scenario, implement secure mobile solutions Flashcards

1
Q

Cellular

A

Primary source of communication for mobile devices.
Cellular communication is on encrypted by connecting to the nearest cell tower.
Communication over WIRES is plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Basic mobile device connections

A

Cellular, Wi-fi, Bluetooth, NFC, Infrared, USB, Point-to-point (PTP), Point-to-multipoint (PTM), GPS, RFID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Point-to-Point
Point-to-Multipoint

A

Communications only received by a single receiver isolated from everything else. Multipoint is the same but connects to multiple receivers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MDM

A

Mobile device Management is managing multiple mobile devices throughout a enterprise. (Government work phones)
Allows you to enforce config settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MCM

A

Mobile Content Management
Controls the “Content” on the mobile phone and what company data is accessed on the the mobile device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Remote Wipe/Remote Sanitation

A

Mobile management that allows you to delete all data if mobile device is lost REMOTELY.
(mobile device needs to receive a signal)
Full Data Encryption (FDE) needs to be enable to prevent data being restored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Geofencing

A

Mobile management that allows you to enable features on a mobile device based on the LOCATION (GPS),

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Geolocation

A

Includes details on the location and any media made by the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Push Notifications
Passwords and PINS
Biometrics (Face ID)

A

Sends information to you device instead of a APP.
Passwords should be strong and storage should be encrypted.
Biometrics uses personal features to authenticate you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Context-Aware Authentication

A

Evaluates the origin and context of what the user is attempting to get.
If the device and location seem familiar then its low risk authentication. If unfamiliar then high risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Storage Segmentation

A

A MDM technique that allows you to separate a users personal data and a companies data.
By doing this you can remotely wipe the company’s data while retaining users data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

FDE

A

Full Data Encryption on a mobile device means that the storage on the device is encrypted and the physical data port is disable when the phone is locked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MicroSD HSM

A

MiroSD Hardware Security Module is a mobile device with a MircoSD card that has small form factor encryption hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MDM/UEM

A

MDM/Unified Endpoint Management is software single management platform that combines MDM and EEM into one for mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MAM

A

Mobile Application Management is like MDM but focuses on Apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SEAndroid

A

Security-Enhanced Android (SEAndroid) is a security improvement for Android.

17
Q

Third-party application stores

A

Mobile devices should not download apps from Third Party App stores because they don’t have strict security posture to host the app.

18
Q

Jail breaking/Rooting

A

Is breaking the digital rights management (DRM) security on the bootloader on the mobile device so that you can full system privileges.
This allows you to download apps that where originally block because of security reasons.

19
Q

Sideloading

A

The act of installing a file from a USB or some storage medium.

20
Q

Custom Firmware

A

Firmware that is installed in place of the original firmware. You do this if the mobile device is jailbroken.

21
Q

Firmware OTA updates

A

Firmware over the air updates is basically like installing a new IOS. But it can effect MDM because the update may go against the MDM.

22
Q

USB OTG

A

USB On-The-Go (OTG) is the connection of a USB device that is connected to a mobile device.

23
Q

WiFi Direct/ad hoc

A

Are peer-to-peer connections that allow WPA2 and WPA3 to connect to other devices without there being a middle man (router)

24
Q

Tethering/Hot Spot

A

Tethering is the act of sharing a cellular network with a mobile device with other devices.
Hotspot is a form of sharing a cellular network through a mobile device.

25
Q

BYOD

A

Bring your own device means you are allowed to bring your own device to work but it a open-ended policy and some mobile devices may not have security.

26
Q

COPE

A

Corporate-Owned Personally Enabled (COPE)
COPE allows the organization to select exactly which devices are to be allowed on the organizational network. They are used for corporate and personal uses.

27
Q

CYOD

A

Choose your Own Device (CYOD)

28
Q

Corporate-Owned

A

Devices that the company owns and should only used for corporate reasons. NO personal activities should be used on this device.

29
Q
A