Why is mobile device hardening important?
Mobile device hardening is important to protect data confidentiality, integrity, and availability, and to improve overall security for both devices and organizations.
What are common risks associated with mobile devices?
Mobile devices are prone to being stolen or lost, frequently used on unsecured public Wi-Fi, and may have outdated software or unapproved apps.
What is a measure to protect data on mobile devices?
Configuring local device encryption ensures that data at rest is inaccessible, even if the device is lost or stolen.
What should be enabled to prevent unauthorized access to mobile devices?
The lock screen should be enabled after a configurable time of inactivity to prevent unauthorized access.
What is a Mobile Device Management (MDM) platform?
An MDM platform manages multiple devices by installing a local agent that enables configuration policies and settings defined by administration.
What can MDM platforms enforce on mobile devices?
MDM platforms can enforce encryption, configure screen locks, restrict app installs, and apply network settings.
What happens if a device is lost or stolen?
Remote wipe and remote lock can be invoked to prevent access to local data.
Why is it important for mobile devices to receive regular updates?
Regular updates ensure that security flaws in the operating system or apps are addressed, preventing vulnerabilities.
How does MDM help with updates?
MDM ensures that all devices receive the same updates and helps to manage compliance with minimum version requirements.
What are best practices for mobile device hardening?
Best practices include using a VPN on untrusted networks, disabling unnecessary transmission components, removing unused apps, and isolating personal data in BYOD environments.
What should organizations conduct to ensure mobile device security?
Organizations should conduct regular audits and compliance checks and educate users on mobile device risks and hygiene practices.
What happens when files are deleted or hard drives are formatted?
Data is not really deleted; it is marked as available for new data to overwrite.
What are the two primary categories of data destruction methods?
What does logical destruction involve?
Using data wiping and overwriting applications to replace original data with random passes of 1s and 0s.
How does physical destruction work?
It involves destroying storage devices through methods like degaussing, shredding, or incinerating.
What are best practices for media sanitization?
Create a written policy, tag and track retired devices, and apply sanitization classifications.
How can you determine the IP address of your router?
Type ipconfig in the command prompt. The default gateway is the address you’re looking for.
What is recommended for the SSID of your Wi-Fi network?
Do not leave the SSID as something that indicates ownership or location, such as your last name or address.
What is the purpose of a Guest Wi-Fi network?
To have access to the Internet only, without accessing the resources on the primary network.
What should you do with the default credentials of your router?
Immediately change the router’s default credentials for security reasons, as they are often easy to guess.
What is a common rule for port forwarding?
To enable remote desktop access into your computer.
What information do you need to create a port forwarding rule?
You need the internal or private IP address of the system you want to connect to.
What is an important first step in securing a router?
Immediately change the default administrative credentials to something more secure.
Why is it a concern if the router’s credentials are written on a sticker?
Anyone with physical access can easily log into the router’s interface.
This is more critical in an office environment than at home.