Lesson 13 Flashcards

1
Q

Mobile Device Deployment Models

A
  • Bring your own device (BYOD)
  • Corporate owned, business only (COBO)
  • Corporate owned, personally-enabled (COPE)
  • Choose your own device (CYOD)
  • Virtual desktop infrastructure (VDI)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

BYOD

A

•Bring your own device (BYOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

COBO

A

•Corporate owned, business only (COBO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CYOD

A

•Choose your own device (CYOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

VDI

A

•Virtual desktop infrastructure (VDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

EMM

A

Enterprise mobility management (EMM) is a class of management software designed
to apply security policies to the use of mobile devices and apps in the enterprise. The
challenge of identifying and managing attached devices is often referred to as visibility.
EMM software can be used to manage enterprise-owned devices as well as BYOD.
There are two main functions of an EMM product suite:

• Mobile device management (MDM)—sets device policies for authentication,
feature use (camera and microphone), and connectivity. MDM can also allow device
resets and remote wipes.

• Mobile application management (MAM)—sets policies for apps that can process
corporate data, and prevents data transfer to personal apps. This type of solution
configures an enterprise-managed container or workspace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Visibility

A

The
challenge of identifying and managing attached devices is often referred to as visibility.
EMM software can be used to manage enterprise-owned devices as well as BYOD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mobile device management (MDM)

A

sets device policies for authentication,
feature use (camera and microphone), and connectivity. MDM can also allow device
resets and remote wipes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mobile application management (MAM)

A

sets policies for apps that can process
corporate data, and prevents data transfer to personal apps. This type of solution
configures an enterprise-managed container or workspace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Unified endpoint management (UEM)

A

Additionally, distinguishing whether client endpoints are mobile or fixed is not really
a critical factor for many of these management tasks, with the consequence that
the latest suites aim for visibility across PC, laptop, smartphone, tablet, and even IoT
devices. These suites are called unified endpoint management (UEM) (redmondmag.
com/Articles/2017/10/01/Unified-Endpoint-Management.aspx).

The core functionality of endpoint management suites extends the concept of
network access control (NAC) solutions. The management software logs the use of a
device on the network and determines whether to allow it to connect or not, based
on administrator-set parameters. When the device is enrolled with the management
software, it can be configured with policies to allow or restrict use of apps, corporate
data, and built-in functions, such as a video camera or microphone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Device enrollment program, Volume Purchase Program and develper Enterprise program

A

Corporatecontrol over iOS devices and distribution of corporate and B2B (Business-to-Business)
apps is facilitated by participating in the Device Enrollment Program the Volume Purchase Program, and the Developer Enterprise Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ios risks

A

There remains the risk that a vulnerability in either iOS or an app
could be discovered and exploited. In this event, users would need to update iOS or the
app to a version that mitigates the exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SEAndroid

A

SEAndroid
(source.android.com/security/selinux) uses mandatory access control (MAC) policies to
run apps in sandboxes. When the app is installed, access is granted (or not) to specific
shared features, such as contact details, SMS texting, and email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mobile Access Control Systems

A
Smartphone authentication
•Password
•PIN
•Swipe pattern
•Biometric

Screen lock

Context-aware authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Context-Aware Authentication

A

It is also important to consider newer authentication models, such as context-aware
authentication. For example, smartphones now allow users to disable screen locks
when the device detects that it is in a trusted location, such as the home. Conversely,
an enterprise may seek more stringent access controls to prevent misuse of a device.
For example, even if the device has been unlocked, accessing a corporate workspace
might require the user to authenticate again. It might also check whether the network
connection can be trusted (that it is not an open Wi-FI hotspot, for instance).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Remote wiop

A
  • “Kill switch”
  • Sets device to factory defaults or clears storage (or storage segment)
  • Initiated from enterprise management software
  • Thief might be able to keep device from receiving the wipe command
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

MicroSD HSM

A

MicroSD HSM is a small form factor hardware security module designed to store
cryptographic keys securely. This allows the cryptographic material to be used with
different devices, such as a laptop and smartphone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Full Device Encryption and External Media

A

iOS device encryption
•Secure erase encryption
•Data protection

Android device encryption
•From version 10, only uses file-level encryption of user data

External media

MicroSD HSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Geolocation

A

Geolocation is the use of network attributes to identify (or estimate) the physical
position of a device. The device uses location services to determine its current position.
Location services can make use of two systems:
• Global Positioning System (GPS)—a means of determining the device’s latitude and
longitude based on information received from satellites via a GPS sensor.
• Indoor Positioning System (IPS)—works out a device’s location by triangulating
its proximity to other radio sources, such as cell towers, Wi-Fi access points, and
Bluetooth/RFID beacons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

GPS vs IPS

A

• Global Positioning System (GPS)—a means of determining the device’s latitude and
longitude based on information received from satellites via a GPS sensor.

• Indoor Positioning System (IPS)—works out a device’s location by triangulating
its proximity to other radio sources, such as cell towers, Wi-Fi access points, and
Bluetooth/RFID beacons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Primary concern for geolocation

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Geofencing

A

Geofencing to apply location-based policies automatically
•Disable on-board camera/video through MDM/EMM controls

Geofencing is the practice of creating a virtual boundary based on real-world
geography. Geofencing can be a useful tool with respect to controlling the use of
camera or video functions or applying context-aware authentication. An organization
may use geofencing to create a perimeter around its office property, and subsequently,
limit the functionality of any devices that exceed this boundary. An unlocked
smartphone could be locked and forced to re-authenticate when entering the
premises, and the camera and microphone could be disabled. The device’s position is
obtained from location services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

GPS tagging

A

GPS tagging is the process of adding geographical identification metadata, such

  • Risksto personal information
  • Track movements (assist social engineering)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Mobile app management

A
  • MDM/EMM application use policies
  • Corporate workspaces
  • Restricting third-party app stores
  • Enterprise app development and fulfillment
    • Sideloading
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
corporate workspaces
When a device is joined to the corporate network through enrollment with management software, it can be configured into an enterprise workspace mode in which only a certain number of authorized applications can run. (apple uses Apple Business Manager)
26
sideloading
Unlike iOS, Android allows for selection of different stores and installation of untrusted apps from any third party, if this option is enabled by the user. With unknown sources enabled, untrusted apps can be downloaded from a website and installed using the .apk file format. This is referred to as sideloading. Conversely, a management suite might be used to prevent the use of third-party stores or sideloading and block unapproved app sources.
27
content managemnt
* Privately owned but corporate use issues * Data ownership * Privacy * Containerization sets up a corporate workspace segmented from the employee’s private apps and data * Storage segmentation ensures separation of data * Enforcing content management/DLP policies
28
containerization
•Containerization sets up a corporate workspace segmented from the employee’s private apps and data
29
•Enforcing content management/DLP policies
Containerization also assists content management and data loss prevention (DLP) systems. A content management system tags corporate or confidential data and prevents it from being shared or copied to unauthorized external media or channels, such as non-corporate email systems or cloud storage services.
30
rooting and jailbreaking
Rooting •Principally Android •Custom firmware/ROM Jailbreaking •Principally iOS •Patched kernel •Tethered jailbreak Carrier unlocking - unlocking the restr Risks to enterprise management
31
carrier unlocking
Carrier unlocking—for either iOS or Android, this means removing the restrictions that lock a device to a single carrier.
32
rooting and jailbraking risks to enterprise management
If the user has applied a custom firmware image, they could have removed the protections that enforce segmentation. The device can no longer be assumed to run a trusted OS. EMM/UEM has routines to detect a rooted or jailbroken device or custom firmware with no valid developer code signature and prevent access to an enterprise app, network, or workspace. Containerization and enterprise workspaces can use cryptography to protect the workspace in a way that is much harder to compromise than a local agent, even from a rooted/jailbroken device. LICENSED FOR
33
Cellular
* Disable cellular data if unmonitored or unfiltered * Prevent use for data exfiltration * Attacks on cellular connections
34
Attacks on cellular connections
There have been attacks and successful exploits against the major infrastructure and protocols underpinning the telecoms network, notably the SS7 hack . There is little that either companies or individuals can do about these weaknesses. The attacks require a high degree of sophistication and are relatively uncommon.
35
GPS
GPS signals can be jammed or even spoofed using specialist radio equipment. This might be used to defeat geofencing mechanisms, for instance
36
A-GPS
As this triangulation process can be slow, most smartphones use Assisted GPS (A-GPS) to obtain coordinates from the nearest cell tower and adjust for the device's position relative to the tower. A-GPS uses cellular data.
37
Risks from Wifi
Risks from Wi-Fi •Legacy security methods •Open access points •Rogue access points Mobile devices usually default to using a Wi-Fi connection for data, if present. If the user establishes a connection to a corporate network using strong WPA3 security, there is a fairly low risk of eavesdropping or man-in-the-middle attacks. The risks from Wi-Fi come from users connecting to open access points or possibly a rogue access point imitating a corporate network. These allow the access point owner to launch any number of attacks, even potentially compromising sessions with secure servers (using a DNS spoofing attack, for instance).
38
Personal Area Network (PAN) technologies
(not hotspot)Personal area networks (PANs) enable connectivity between a mobile device and peripherals. Ad hoc (or peer-to-peer) networks between mobile devices or between mobile devices and other computing devices can also be established. In terms of corporate security, these peer-to-peer functions should generally be disabled. It might be possible for an attacker to exploit a misconfigured device and obtain a bridged connection to the corporate network.
39
Wi-Fi Direct
Wi-Fi Direct •Ad hoc networks •Soft access point •Wireless mesh networking Wi-Fi Direct allows one-to-one connections between stations, though in this case one of the devices actually functions as a soft access point. Wi-Fi Direct depends on Wi-Fi Protected Setup (WPS), which has many vulnerabilities. Android supports operating as a Wi-Fi Direct AP, but iOS uses a proprietary multipeer connectivity framework. You can connect an iOS device to another device running a Wi-Fi direct soft AP, however.
40
ad hoc network,
Wireless stations can establish peer-to-peer connections with one another, rather than using an access point. This can also called be called an ad hoc network, meaning that the network is not made permanently available.
41
Tethering and hotspots
you know this
42
Bluetooth
Bluetooth is one of the most popular technologies for implementing PANs. While native Bluetooth has fairly low data rates, it can be used to pair with another device and then use a Wi-Fi link for data transfer. This sort of connectivity is implemented by iOS's AirDrop feature.
43
bluetooth device discovery
Device discovery—a device can be put into discoverable mode meaning that it will connect to any other Bluetooth devices nearby. Unfortunately, even a device in nondiscoverable mode is quite easy to detect.
44
Authentication and authorization—bluetooth
``` devices authenticate ("pair") using a simple passkey configured on both devices. This should always be changed to some secure phrase and never left as the default. Also, check the device's pairing list regularly to confirm that the devices listed are valid. ```
45
Malware (bluetooth)
there are proof-of-concept Bluetooth worms and application exploits, most notably the BlueBorne exploit (armis.com/blueborne), which can compromise any active and unpatched system regardless of whether discovery is enabled and without requiring any user intervention. There are also vulnerabilities in the authentication schemes of many devices. Keep devices updated with the latest firmware.
46
bluetooth security issues
- Device discovery - Authentication and authorization - Malware and exploits
47
bluejacking,
Unless some sort of authentication is configured, a discoverable device is vulnerable to bluejacking, a sort of spam where someone sends you an unsolicited text (or picture/ video) message or vCard (contact details). This can also be a vector for malware, as demonstrated by the Obad Android Trojan malware
48
Bluesnarfing
refers to using an exploit in Bluetooth to steal information from someone else's phone
49
bluetooth (peripheral devices)
Other significant risks come from the device being connected to. A peripheral device with malicious firmware can be used to launch highly effective attacks. This type of risk has a low likelihood, as the resources required to craft such malicious peripherals are demanding.
50
Infrared
Infrared signaling has been used for PAN in the past (IrDA), but the use of infrared in modern smartphones and wearable technology focuses on two other uses: • IR blaster—this allows the device to interact with an IR receiver and operate a device such as a TV or HVAC monitor as though it were the remote control handset. • IR sensor—these are used as proximity sensors (to detect when a smartphone is being held to the ear, for instance) and to measure health information (such as heart rate and blood oxygen levels).
51
IR blaster vs IR sensor
• IR blaster—this allows the device to interact with an IR receiver and operate a device such as a TV or HVAC monitor as though it were the remote control handset. • IR sensor—these are used as proximity sensors (to detect when a smartphone is being held to the ear, for instance) and to measure health information (such as heart rate and blood oxygen levels).
52
Radio Frequency ID (RFID)
``` Radio Frequency ID (RFID) •(Usually) unpowered tags •Transmit when in range of reader •Skimming attack •Encrypt sensitive information ``` means of encoding information into passive tags, which can be easily attached to devices, structures, clothing, or almost anything else. A passive tag can have a range from a few centimeters to a few meters. When a reader is within range of the tag, it produces an electromagnetic wave that powers up the tag and allows the reader to collect information from it or to change the values encoded in the tag. There are also battery-powered active tags that can be read at much greater distances (hundreds of meters).
53
RFID Skimming
One type of RFID attack is skimming, which is where an attacker uses a fraudulent RFID reader to read the signals from a contactless bank card. Any reader can access any data stored on any RFID tag, so sensitive information must be protected using cryptography.
54
Near Field Communications (NFC)
NFC is based on a particular type of radio frequency ID (RFID). NFC sensors and functionality are now commonly incorporated into smartphones. An NFC chip can also be used to read passive RFID tags at close range. It can also be used to configure other types of connections (pairing Bluetooth devices for instance) and for exchanging information, such as contact cards.
55
nfc Connection configuration/bump
An NFC chip can also be used to read passive RFID tags at close range. It can also be used to configure other types of connections (pairing Bluetooth devices for instance) and for exchanging information, such as contact cards. An NFC transaction is sometimes known as a bump,
56
bump
An NFC transaction is sometimes known as a bump,
57
Mobile wallet apps
machines. To configure a payment service, the user enters their credit card information into a mobile wallet app on the device. The wallet app does not transmit the original credit card information, but a one-time token that is interpreted by the card merchant and linked backed to the relevant customer account. There are three major mobile wallet apps: Apple Pay, Google Pay (formerly Android Pay), and Samsung Pay.
58
NFC vulnerabilties
* Eavesdropping/skimming * Denial of service Despite having a close physical proximity requirement, NFC is vulnerable to several types of attacks. Certain antenna configurations may be able to pick up the RF signals emitted by NFC from several feet away, giving an attacker the ability to eavesdrop from a more comfortable distance. An attacker with a reader may also be able to skim information from an NFC device in a crowded area, such as a busy train. An attacker may also be able to corrupt data as it is being transferred through a method similar to a DoS attack—by flooding the area with an excess of RF signals to interrupt the transfer.
59
USB OTG
- USB OTG allows a port to function as a device or hub Some Android USB ports support USB On The Go (OTG) and there are adapters for iOS devices. USB OTG allows a port to function either as a host or as a device. For example, a port on a smartphone might operate as a device when connected to a PC, but as a host when connected to a keyboard or external hard drive. The extra pin communicates which mode the port is in.
60
USB OTG vulernabilitie
* USB with malicious firmware might be able to perform an exploit * Spread malware between computers using the device as a vector * Install or run malware to try to compromise the smartphone itself •Juice jacking
61
juice-jacking
It is also possible that a charging plug could act as a Trojan and try to install apps (referred to as juice-jacking), though modern versions of both iOS and Android now require authorization before the device will accept the connection.
62
sms and mms
The Short Message Service (SMS) and Multimedia Message Service (MMS) are operated by the cellular network providers. They allow transmission of text messages and binary files. Vulnerabilities in SMS and the SS7 signaling protocol that underpins it have cast doubt on the security of 2-step verification mechanisms (kaspersky.com/ blog/ss7-hacked/25529).
63
RCS
Rich communication services (RCS) •Exploits against handling of attachments or rich formatting Rich Communication Services (RCS) is designed as a platform-independent advanced messaging app, with a similar feature set to proprietary apps like WhatsApp and iMesssage. These features include support for video calling, larger binary attachments, LICENSED FOR USE ONLY BY: TYLER LUKE · 16249171 · MAY 26 2021 Lesson 13: Implementing Secure Mobile Solutions | Topic 13B The Official CompTIA Security+ Student Guide (Exam SY0-601) | 361 group messaging/calling, and read receipts. RCS is supported by carriers via Universal Profile for Advanced Messaging (gsma.com/futurenetworks/digest/universal-profileversion- 2-0-advanced-rcs-messaging). The main drawbacks of RCS are that carrier support is patchy (messages fallback to SMS if RCS is not supported) and there is no end-to-end encryption, at the time of writing (theverge.com/2020/5/27/21271186/ google-rcs-t-mobile-encryption-ccmi-universal-profile). Vulnerabilities in processing attachments and rich formatting have resulted in DoS attacks against certain handsets in the past, so it is important to keep devices patched against known threats.
64
Push notifications
* Potential vector for spam, phishing, or hoaxing * Make sure developer account credentials are kept secure Push notifications are store services (such as Apple Push Notification Service and Google Cloud to Device Messaging) that an app or website can use to display an alert on a mobile device. Users can choose to disable notifications for an app, but otherwise the app developer can target notifications to some or all users with that app installed. Developers need to take care to properly secure the account and services used to send push notifications. There have been examples in the past of these accounts being hacked and used to send fake communications.
65
Firmware Over-the-Air Updates
This is updates to the device's modem's operating systems...not the devices operating system (ios, android)...might need to read this section again. * Baseband updates and radio firmware * Over the Air (OTA) update delivery * Risks from rooted/jailbroken devices * Risks from highly targeted attacks
66
Microwave Radio
Cellular networks are microwave radio networks provisioned for multiple subscribers. Microwave radio is also used as a backhaul link from a cell tower to the service provider's network. These links are important to 5G, where many relays are required and provisioning fiber optic cabled backhaul can be difficult. Private microwave links are also used between sites.
67
Modes a microwave link can be provisioned
Point-to-point (P2P) microwave Point-to-multipoint (P2M)
68
P2P
Point-to-point (P2P) microwave uses high gain antennas to link two sites. High gain means that the antenna is highly directional. Each antenna is pointed directly at the other. In terms of security, this makes it difficult to eavesdrop on the signal,as an intercepting antenna would have to be positioned within the direct path. The satellite modems or routers are also normally paired to one another and can use over-the-air encryption to further mitigate against snooping attacks.
69
P2M
Point-to-multipoint (P2M) microwave uses smaller sectoral antennas, each covering a separate quadrant. Where P2P is between two sites, P2M links multiple sites or subscriber nodes to a single hub. This can be more cost-efficient in high density urban areas and requires less radio spectrum. Each subscriber node is distinguished by multiplexing. Because of the higher risk of signal interception compared to P2P, it is crucial that links be protected by over-the-air encryption.
70
Other types of multipoint
Multipoint can be used in other contexts. For example, Bluetooth supports a multipoint mode. This can be used to connect a headset to multiple sources (a PC and a smartphone, for instance) simultaneously.