What are the top ten mobile risks considered by OWASP?
What are the different points in a mobile attack that can be exploited?
Once a Mobile is compromised, what types of activities can an attacker do?
What are the mobile attack vectors and vulnerabilities?
Why is SMiShing (SMS Phishing) effective?
What is Android OS?
A soft environment developed by Google for mobile devices that includes an OS, middleware, and key applications.
What makes up the Android OS architecture?
What is Android Rooting?
Allows users to attain privileged control (root) within Androids subsystem. Enables all the user-installed apps to run privileged commands like removing bloatware, Bluetooth tethering, and install apps on SD. Comes with risks like voiding your warranty, poor performance, malicious performance, bricking the device.
What are some steps to secure your Android Device?
Enable screen locks
Never root your device
Only download apps from official Android market
Keep device updated with Google Android AV software
Do not directly download Android package files.
Update OS regularly
Use Android protector that assigns passwords to text messages, mail accounts, etc
Lock apps
What are the layers of the iOS?
What is “jailbreaking”?
The process of installing a modified set of kernel patches that allows users to run 3rd party apps not signed by the OS vendor. Provides root access to the OS and removes sandbox restrictions.
What are the different types of jailbreaking?
What are the different techniques for Jailbreaking?
What are the guidelines for securing iOS devices?
What is Mobile Spyware?
A software tool that gives you full access to monitor a victim’s phone. Secretly records all activity.
What are the most common features of mobile spyware?
What is Mobile Device Management (MDM)?
Provides platforms for over-the-air or wored distribution of applications, data and config settings for all types of mobile devices. Helps sys admins to deploy and manage software apps across all enterprise devices. Can enforce passcodes, remotely lock device, wipe data, detects jailbreaks, enforce policies, and perform real time monitoring.
What is BYOD and what are the benefits?
Refers to a policy where an employee uses their own personal device to for workplace activities such as accessing company resources. It can increase productivity, employee satisfaction, work flexibility, and lower costs.
What are the risks of BYOD?
Sharing confidential data over unsecured network, endpoint security issues, improperly disposing device, support of many different devices, mixing personal and private data, lost or stolen devices, lack or awareness, ability to bypass company policies, infrastructure issues, disgruntled employees.
What are the different steps for implementing BYOD Policy?
What are the security guidelines of BYOD?
What are the general guidelines for Mobile Platform Security?
What are the Mobile Device Security Guidelines for Admins?
What are SMS Phishing Guidelines?