Chapter 5 - Mobile Device Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

How can personal data lead to account takeover?

Attackers can use personal data to impersonate the victim.

Why should you avoid rooting or jailbreaking your device?

It bypasses built-in protections and invites security issues.

Why should BYOD be avoided?

It introduces a lot of risk, and CYOD or employer-furnished devices are better.

How does Google Voice provide extra security?

It provides an alternate number and hides the actual cellphone number.

What are some common Bluetooth pairing keys that can make a device vulnerable to Bluetooth attacks?

Keys like 0000 or 1234.

What is the topic of this section?

Mobile device security

What is an increasing part of our life?

Mobile devices are an increasingly large part of our life.

What risks come with the widespread use of mobile devices?

Mobile devices are susceptible to malware that can compromise personal information.

What is a critical precaution to take to protect data on your device?

Regular device backup to avoid loss of data and memories.

What are some additional features of the Find my iPhone and Find my Phone services?

Remote lock option and remote wipe option.

Why might you want to use a remote wipe?

Remote wipe can protect your personal data from being accessed by unauthorized persons, even if the device is in their possession.

What type of browsers should you use for better app security?

Reputable and secure browsers.

What should users be trained on regarding device usage?

Safe social media use, safe browsing, and appropriate app installation.

Where should you download applications for mobile devices?

Secure sources for app downloads

What is mobile device hardening?

Securing mobile devices against attacks.

What is Bluejacking?

Sending unsolicited messages to Bluetooth-enabled devices.

Who pays for the device in CYOD?

The company.

Why do companies adopt CYOD?

To maintain control over security, prevent certain applications from being installed, ensure regular updates, and manage data loss prevention.

Why is it important to update your device?

To patch known vulnerabilities and ensure the latest software version.

Why is it necessary to install antivirus on mobile devices?

To protect against malware and other threats.

Why is mobile device hardening important?

To protect against potential security breaches and unauthorized access.

Why should encryption be enabled?

To secure voice and data information.

What are Bluesnarfing and Bluejacking?

Types of Bluetooth attacks

What is Bluesnarfing?

Unauthorized access of information from a wireless device over a Bluetooth connection.

What is cellphone account takeover?

Unauthorized access to a person's cellphone account.

Why is updating and patching mobile devices important?

Updating and patching fixes vulnerabilities that can be exploited by attackers.

How can you find the location of a lost or stolen Apple or Android device?

Use Find my iPhone for Apple devices and Find my Phone for Android devices. These services use the device's data location and GPS signal to determine its location.

What are some steps to harden mobile devices?

Using strong passwords, enabling encryption, updating software, avoiding unsecured Wi-Fi.

What are some security concerns with Wi-Fi and Bluetooth connections?

Wi-Fi and Bluetooth connections

What are the two main things we have to think about when securing wireless devices?

Wi-Fi and Bluetooth.

What features should be turned off when not in use?

Wi-Fi, Bluetooth, NFC, mobile hotspots, tethering, and location tracking.

How has work evolved these days?

Work has evolved to be more mobile, allowing us to work from anywhere.

Can malicious software make it into the official app stores?

Yes, despite checks, malicious software can occasionally make it into the official app stores.

What should be established for mobile devices in an organization?

A robust security policy detailing expectations and necessary security measures.

What is the Choose Your Own Device (CYOD) model?

A variation of BYOD where an organization offers a selection of devices for employees to choose from.

What is the process of updating the operating system on an iPhone and Android?

Apple pushes updates, while Android updates are pushed by Google to manufacturers, who then customize the update.

What should you avoid doing on Apple devices to ensure app security?

Avoid jailbreaking.

What should you avoid doing on Android devices to ensure app security?

Avoid rooting.

What can you do to prevent Bluetooth attacks?

Avoid using default pairing key, turn off Bluetooth when not in use, and disable discoverable mode.

How can one protect against account takeover?

Be cautious about sharing phone number and use services like Google Voice.

What are some ways to secure mobile devices?

Best ways to secure mobile devices

What are the two types of Bluetooth attacks mentioned?

Bluejacking and Bluesnarfing.

What is the topic of this lesson?

Bluetooth attacks.

What does BYOD stand for?

Bring Your Own Device policy

What should you do if you have to use a wireless device?

Check manufacturer specs for encryption type.

What is SIM cloning?

Creating a duplicate SIM card to gain unauthorized access.

How does device encryption protect your data?

Device encryption uses a PIN and encryption key to prevent unauthorized access to the information on the device, even if it's stolen.

What is Mobile Device Management (MDM) software used for?

Enforcing security policies across mobile devices.

What features should be enabled for potential emergencies?

Find My Phone, remote lockout, and remote wipe.

When should you turn off location services for apps?

For apps that don't need it.

What should you be aware of when sharing photos and data?

Geotagging and potential tracking.

What are the official mobile stores for Android and iPhones?

Google Play for Android and App Store for iPhones.

What are Version 2 SIM cards?

Harder to clone SIM cards that reduce the risk of SIM cloning.

How can we protect our mobile devices from malware?

Having an antivirus solution and checking email attachments for malware can help protect against mobile malware.

How can you ensure the security of the apps you install on your phone?

Install apps from official mobile stores only.

What can the company do with the device in CYOD?

Install necessary management and security software on it.

What should you look for in a website's address to ensure secure browsing?

Look for 'https' at the beginning of the web address.

Why is losing a mobile device problematic beyond its monetary value?

Losing a mobile device not only means losing the device itself but also all the data, pictures, and potentially irreplaceable memories stored on it.

What is mobile malware?

Malware on mobile devices

What is a recommended source for downloading applications?

Official App Store for Apple devices and Google Play store for Android devices.

Are official applications or third-party applications more secure?

Official applications tend to be more secure.

Where should you download applications from?

Official stores like App Store and Google Play Store.

What activities can be done on mobile devices?

On mobile devices, we can check emails, text friends, do banking, shopping, and store personal information.

How is the link between a smartphone and a Bluetooth device secured?

Pairing and shared link key encryption.

What is SIM cloning?

Process of duplicating SIM card information

What can you do if your device is lost or stolen?

Set up tracking on your device, report to the police, and do not try to recover the device alone.

Why should you try to avoid wireless devices if you're concerned about confidentiality?

Some devices have weaker encryption.

What should you do if your mobile device is stolen?

Steps to take when a device is stolen

What are examples of strong device log on methods?

Strong passwords, thumbprints, and face scans.

What is mobile device hardening?

The process of enhancing security on mobile devices.

What is the current highest level of Wi-Fi protection?

WPA2, relies on AES.


Set pelajaran terkait

CHAPTER 28 - FLUID AND ELECTROLYTES - PrepU

View Set

Department of Defense (DoD) Cyber Awareness Challenge 2024 (1 hr)

View Set

Life Insurance Underwriting and Policy Issue

View Set

Session 16 - Pay Structure Design

View Set

Nur 210 Cultural Diversity Quiz Practice

View Set

327 Chapter 7: Pain Management Q's

View Set