Mobile device vulnerabilities 2.3 Flashcards

(4 cards)

1
Q

Mobile device security

A

Challenge to secure. Often need additional secuirty policies and systems.

Relatively small. Can be almost invisible.

Almost always in motion. You never know where it might be.

Packed with sensitive data. Personal and organizational.

Constantly connected to the internet. Nothing bad happens on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Jailbreaking/rootingus

A

Mobile devices are purpose-built systems. You don’t have access to the operating system.

Gaining access. Android-rooting. Apple IOS-Jailbreaking.

Install custom firmware. Replaces the existing operating system.

Uncontrolled access. Circumvent security features. The MDM becomes relatively useless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sideloading

A

Malicious apps can be a significant security concern. One Trojan horse can create a data breach.

Manage installation sources. The global or local app store.

Sideloading circumvents security. Apps can be installed manually without using an app store. Again, your MDM becomes relatively useless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly