3.7 Attacks & exploits: Attacks on Mobile Devices Flashcards
(49 cards)
Enterprise Mobility Management: what is Enterprise Mobility Management (EMM)?
Enables centralized management and control of corporate mobile devices
● Tracking
● Controlling
● Securing
Enterprise Mobility Management: what is Mobile Device Management (MDM)? What technical control features a MDM has?
Tool for securing, managing, and monitoring mobile devices within an organization:
- Application control
- Password and Passcode functionality
- MFA requirement
- Token-based access
- Patch management
- Remote wipe
Enterprise Mobility Management: what is Remote Wipe?
Reverts a device back to its factory default settings and sanitizes the sensitive data from the device’s onboard storage
Enterprise Mobility Management: what is Trust Certificates used for device? Is it a secure way to certify a device?
Globally identifies a trusted device within an organization. A trust certificate can be copied by an attacker
Enterprise Mobility Management: what is User-Specific Certificates used for device?
Assigned to a device to uniquely identify it on the network
Enterprise Mobility Management: what is Firmware Update?
Updates the baseband of the radio modem used for cellular, Wi-Fi, Bluetooth, NFC, and GPS connectivity
Deployment Options: what are the different deployment options for MDM (5)? Explain each of them
o Corporate-Owned, Business Only (COBO): Purchased by the company for use by the employees only for work-related purposes (Most secure, Most restrictive, Most expensive)
o Corporate-Owned, Personally-Enabled (COPE): Provides employees with a company procured device for work-related and/or personal use
o Choose Your Own Device (CYOD): Allows employees to select a device from an approved list of vendors or devices
o Bring Your Own Device (BYOD): Allows employees to bring their own devices into work and connect them to the corporate network. BYOD brings up privacy concerns and is the most difficult to secure
o Virtual Mobile Infrastructure (VMI): Like VDI, but utilizes a virtualized mobile operating system
Mobile Reconnaissance Concerns:
Mobile Device Insecurity: list the potentials insecurity related to mobile devices (4)
o Jailbreaking
o Rooting
o Sideloading
o Unauthorized app stores
Mobile Device Insecurity: what is Jailbreaking?
Enables a user to obtain root privileges, sideload apps, change or add carriers, and customize the interface of an iOS device
Mobile Device Insecurity: what is Rooting and how can you do it (2)?
▪ Custom Firmware/Custom ROM: A new Android OS image that can be applied to a device
▪ Systemless Root: Does not modify system partitions or files and is less likely to be detected than a custom ROM
Mobile Device Insecurity: what is Sideloading?
Installs an app on a mobile device directly from an installation package instead of an official store
Mobile Device Insecurity: what is Unauthorized app stores?
Android and iOS devices block the installation of third-party applications by default
Mobile Device Insecurity: list the security configuration to secure your mobile device (7)
o Device Configuration Profiles/Protocols
o Full Device Encryption
o VPN
o Location Services
o Geolocation
o Geofencing
o Geotagging
Mobile Device Insecurity: explain Device Configuration Profiles/Protocols
▪ Implement settings and restrictions for mobile devices from centralized mobile device management systems
▪ Profiles are mainly used for security, but can also provide a vulnerability
Mobile Device Insecurity: explain Full Device Encryption and their options on iOS, Android v6/v7/v9 and HSM
▪ iOS: 256-bit unique ID
▪ Android v6: 128-bit AES keys
▪ Android v7: File-based encryption
▪ Android v9: Metadata encryption
▪ MicroSD Hardware Security Module (HSM): Stores the different cryptographic keys securely inside the mobile device, like a TPM module in a desktop or laptop
Mobile Device Insecurity: explain VPN
Some MDM solutions provide a third-party VPN client
Mobile Device Insecurity: explain Location Services
Refers to how a mobile device is allowed to use cellular data, Wi-Fi, GPS, and Bluetooth to determine its physical location
Mobile Device Insecurity: explain Geolocation, Geofencing and Geotagging
o Geolocation: Uses a device’s ability to detect its location to determine if access to a particular resource should be granted
o Geofencing: Creates virtual boundaries based on geographical locations and coordinates
o Geotagging: Adds location metadata to files or devices
Multifactor Authentication: what is the difference between Identification and Authentication?
o Identification: Provides identity
o Authentication: Validates identity
Multifactor Authentication: explain MFA and authentication attributes (5)
Uses two or more means (or factors) to prove a user’s identity:
● Knowledge (Something you know)
● Ownership (Something you have)
● Characteristic (Something you are)
● Location (Somewhere you are)
● Action (Something you do)
Multifactor Authentication: explain FAR, FRR and CER
o False Acceptance Rate (FAR): Rate that a system authenticates a user as authorized or valid when they should not have been granted access to the system
o False Rejection Rate (FRR): Rate that a system denies a user as authorized or valid when they should have been granted access to the system
o Crossover Error Rate (CER): An equal error rate (ERR) where the false acceptance rate and false rejection rate are equal
Multifactor Authentication: explain the OTP algorithms (2)
▪ Time-Based One-Time Password (TOTP): Computes password from a shared secret and the current time
▪ HMAC-Based One-Time Password (HOTP): Computes password from a shared secret and is synchronized across the client and the server
Multifactor Authentication: explain In-Band Authentication and Out-of-Band Authentication. Which one is the most secure?
▪ In-Band Authentication: Relies on an identity signal from the same system requesting the user authentication
▪ Out-of-Band Authentication: Uses a separate communication channel to send the OTP or PIN
o Implement 2FA or MFA that relies on out-of-band authentication system for high-security networks