Shared Flashcard Set

Details

CompTIA Sec+ 2.5
Tools and Technologies: Deploying Mobile Devices Securely
30
Computer Science
Professional
11/12/2018

Additional Computer Science Flashcards

 


 

Cards

Term
Connection Methods
Definition
-Cellular -NFC
-WiFi -ANT
-SATCOM -Infrared
-Bluetooth -USB
Term
Mobile Phone Security Risks
Definition
-No Password / PIN
-Unpatched OS or Apps
-Jailbreaking or Rooting
-Unauthorized Applications
-Malware
Term
Methods to Secure Mobile Devices
Definition
-Two factor auth
-Biometric
-Verify and authenticate downloaded apps
-AntiMalware Software
-Firewalls
-Remote disable / Remote wipe
-Encryption
Term
Near Field Communications NFC
Definition
-Contactless payment systems
-3 foot range
-Eavesdropping
-Data corruption / manipulation
-Interception
Term
Securing NFC
Definition
Encrypted Communications
Term
Mobile Device Attack Vectors
Definition
-Intercepting Data
-MiTM attacks
-Data Corruption
-ANT+ Gym Equipment
-Infrared
-Bluejacking and Bluesnarfing
-SATCOM
Term
Mobile Device Security
Definition
-Lost/stolen
-Compromised on Public WiFi
-Asset Tracking
-App Management
Term
MDM software security
Definition
Policies to be enforced:
-strong passwords
-Lock Screens
-Disable Unneeded services
-App/Software Control
Term
MDM Security Threat Mitigation
Definition
-Full Device Encryption
-Remote Wipe
-GPS Enabled
-MDM Software
Term
Application Security
Definition
Authentication
Geo-Tagging
Biometrics
Push Notification Services
Encryption
Key / Credential Management
Term
Key / Credential Management
Definition
-Managing device content, access, and authentication
-Digital Certificates to Authenticate
Term
Authentication
Definition
-PKI / Digital Certs
-Enforce password policies
-VPN / Two Factor Auth (RSA)
Term
GEO Tagging
Definition
-Tagged with coordinates where it is made
-Pictures and documents
-Security Risk: pinpoint location
Term
EXIF Data
Definition
Tagging document with Lat, Long, and Alt
Term
Context-Aware Authentication
Definition
Type of two factor Auth (2FA) that provides for a more friction-less experience
-Predefined Rules to determine auth or if a more stringent challenge should be used
-Can be device finger printing, geo-location, geo-fencing, or geo-velocity
-User is denied or required higher level auth
Term
Enforcement and Monitoring
Definition
-Third party app stores
-rooting / jailbreaking
-side loading apps
-Custom firmware
-Carrier unlocking
-Firmware OTA updates
-Camera use
-SMS/MMS
-External Media
-USB or On the go (OTG)
-Microphone
-Policies to control GPS Tagging
-Policies for WiFi direct/ad hoc
-Policy for tethering
-Payment Methods
Term
BYOD Concerns
Definition
Challenges:
-Monitoring
-Patch Management
-Access to Data
Term
COPE (Corporate Owned Personally Enabled)
Definition
Bridges Gap between device for corporate owned resources and employees personal tasks
Term
CYOD (Choose Your Own Device)
Definition
Enables employees to select from a list of company approved choices in mobile devices
Term
Deployment Models
Definition
-Corporate Owned
-VDI thin client to user
-Desktop resides on a server
Term
Persistent Desktop
Definition
VDI where desktop stays the way a user configured it
Term
Non Persistent Desktop
Definition
Desktop where the user gets a clean newly installed desktop every time they log in.
Term
BYOD Policy Concerns
Definition
-Data Ownership
-Support Ownership
-Patch management
-AV MAnagement
-Forensics access to whole device?
-Privacy: What is considered private data? When it is personally owned?
-On boarding / Off boarding policies
-Adherence to Policies
-User Acceptance
-Infrastructure Considerations
-Legal concern acceptable use
-On board cameras or video
Term
BYOD
Definition
A corporate mobile device strategy that requires the user to have their own mobile device
Term
COPE
Definition
A mobile device strategy that allows personal use of devices owned by the corporate
Term
CO
Definition
A mobile device strategy where the corporation owns the equipment and personal use of the device is not allowed.
Term
CYOD
Definition
A mobile device strategy where the corporation would provide the end user with a number of different options for a mobile device, and let the user choose one.
Term
VMI
Definition
A mobile device strategy that provides remote access to server based infrastructure. Applications are written for that infrastructure and accessed from many types of devices. The apps and data reside on the host.
Term
Windows System File integrity checker
Definition
sfc
Term
Log file created by SFC
Definition
cbs.log
Supporting users have an ad free experience!