0% found this document useful (0 votes)
41 views6 pages

Module 6.1 Summary CMPG 215

The document outlines various mobile security threats, including AI-powered phishing, deepfake scams, and zero-click exploits, highlighting the vulnerabilities associated with mobile devices and connectivity methods. It also discusses enterprise deployment models such as BYOD, COPE, and CYOD, detailing their benefits and risks for both enterprises and users. Additionally, it emphasizes the importance of strong authentication, segmentation, and mobile device management to protect against security risks.

Uploaded by

mpilobiyela2628
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views6 pages

Module 6.1 Summary CMPG 215

The document outlines various mobile security threats, including AI-powered phishing, deepfake scams, and zero-click exploits, highlighting the vulnerabilities associated with mobile devices and connectivity methods. It also discusses enterprise deployment models such as BYOD, COPE, and CYOD, detailing their benefits and risks for both enterprises and users. Additionally, it emphasizes the importance of strong authentication, segmentation, and mobile device management to protect against security risks.

Uploaded by

mpilobiyela2628
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Mobile Security Threats

 AI-Powered Phishing Attacks: Cybercriminals use AI to create


highly realistic phishing messages that are difficult to detect.

 Deepfake Scams: Fake voice and video calls used to impersonate


trusted individuals and steal sensitive information.

 Zero-Click Exploits: Malware that can infect a device without any


user interaction, often just by receiving a message.

 5G and IoT Vulnerabilities: More connected devices increase the


potential attack surface.

 Malicious Apps on Official Stores: Even official app stores like


Google Play and the App Store are not entirely safe; malicious apps
can still be found.

 Cloud Storage Breaches: Mobile data stored in the cloud is a


prime target for attackers.

 SIM Swapping 2.0: Hackers are improving methods to hijack


phone numbers, steal two-factor authentication (2FA) codes, and
access accounts.

 Cryptojacking on Mobile: Your phone's processing power can be


secretly used to mine cryptocurrency without your knowledge.

Introduction to Mobile Devices

Types of Mobile Devices:

 Smartphones: Devices with all the tools of a feature phone plus an


operating system (OS) that allows it to run apps and access the
internet.

 Wearables: Devices worn by the user, such as smartwatches

 Tablets: Portable computing devices typically without a built-in


keyboard or mouse.

 Portable computers: Devices that closely resemble the


functionality of desktop computers but are smaller, self-contained,
battery-powered, and easily transported. They often have a limited
OS version and a web browser with an integrated media player
Mobile Device Connectivity Methods

 USB connections: Different types and sizes of Universal Serial Bus


(USB) connectors on mobile devices used for data transfer.

 Bluetooth: Uses short-range radio frequency transmissions for


rapid device pairings (typically 10m, but can extend up to 100m).

 Wi-Fi (WLAN): A wireless local area network designed to replace or


supplement a wired local area network (LAN).

 Cellular: Provides coverage area for a cellular telephony network


divided into cells. Transmitters connect through a mobile
telecommunications switching office (MTSO) that controls all of the
transmitters in the cellular network

Enterprise Deployment Models

 Bring Your Own Device (BYOD): Employees use their own


personal mobile devices for business purposes. Employees have full
responsibility for choosing and supporting the device. Popular with
smaller companies or those with temporary staff.

 Benefits for Enterprise: High - Employees use personal devices with


minimal restrictions (Management Flexibility), High - Employees
manage their own devices (Less Oversight), High - No need to
purchase devices (Cost Savings), Low - Variety of devices and OS
creates complexity (Simplified IT Infrastructure), High - Employees
handle their own troubleshooting (Reduced Internal Service), High -
Employees work with familiar devices (Increased Employee
Performance).

 User Benefits: High - Employees use any device they prefer (Choice
of Device), High - Employees select their own carrier and plan
(Choice of Carrier), High - Employees use a familiar device for work
and personal tasks (Convenience).

 Corporate Owned, Personally Enabled (COPE): Employees


choose from a selection of company-approved devices. Employees
are supplied the device and paid for it by the company, but can use
it for personal activities. Company decides the level of choice and
freedom for employees.

 Benefits for Enterprise: Low - IT fully controls and manages devices


(Management Flexibility), Low - IT enforces strict policies (Less
Oversight), Low - Company bears full cost of devices (Cost Savings),
High - Standardized devices streamline management (Simplified IT
Infrastructure), Low - IT fully responsible for maintenance and
support (Reduced Internal Service), Moderate - Corporate
restrictions may impact usability (Increased Employee Performance).

 User Benefits: Low - Company assigns a specific device (Choice of


Device), Low - Company decides the carrier and plan (Choice of
Carrier), Moderate - Employees carry only one device but with
restrictions (Convenience).

 Choose Your Own Device (CYOD): Employees choose from a


limited selection of approved devices but pay the upfront cost while
the business owns the contract. Employees are offered a suite of
choices that the company has approved for security, reliability, and
durability. Company often provides a stipend to pay monthly fees to
a wireless carrier.

 Benefits for Enterprise: Moderate - IT controls approved devices but


offers employee choice (Management Flexibility), Moderate - IT
manages security, but employees have some autonomy (Less
Oversight), Moderate - Company subsidizes or shares costs with
employees (Cost Savings), Moderate - Fewer devices to support
compared to BYOD (Simplified IT Infrastructure), Moderate - IT
supports a limited range of approved devices (Reduced Internal
Service), Moderate - Employees get a choice while ensuring
compatibility (Increased Employee Performance).

 User Benefits: Moderate - Employees choose from a list of approved


devices (Choice of Device), Moderate - Limited selection of
company-approved carriers (Choice of Carrier), High - Employees
get a company-approved device that suits their needs
(Convenience).

 Virtual Desktop Infrastructure (VDI): Stores sensitive


applications and data on a remote server accessed through a
smartphone. Users can customize the display of data as if it were
residing on their own mobile device. Enterprise can centrally protect
and manage apps and data on a server instead of distributing to
smartphones.

 Corporate owned: The device is purchased and owned by the


enterprise. Employees use the phone only for company-related
business. Enterprise is responsible for all aspects of the device.

Mobile Device Risks


Increased reliance on mobile devices for business means employees
access sensitive data, increasing the interest of threat actors. Security
risks include:

 Mobile device vulnerabilities

 Connection vulnerabilities

 Access to untrusted content

Mobile Device Vulnerabilities

 Physical security: Mobile devices are frequently lost or stolen.

 Limited updates: Security patches and OS updates are distributed


through firmware over-the-air (OTA) updates.

 Location tracking: Using geolocation data increases the risk of


targeted physical attacks. GPS tagging is a related risk.

 Unauthorized recording: Malware can infect a device and allow a


threat actor to spy on an unsuspecting victim and record
conversations or videos.

Connection Vulnerabilities

 Tethering: An unsecured mobile device tethered to a corporate


network may infect the network.

 USB On-the-Go (OTG): Connecting a malicious flash drive infected


with malware to a mobile device via OTG could lead to infection. The
infected device could then connect to an infected computer,
allowing malware to be sent.

 Malicious USB cable: A USB cable with an embedded Wi-Fi


controller can receive commands from a nearby device to send
malicious commands. This could exploit the system by giving the
attacker enough permissions.

 Hotspots: Public hotspots are beyond the control of the


organization. Attackers can eavesdrop on data transmissions and
view sensitive information.

Accessing Untrusted Content

 Users can bypass built-in installation limitations by jailbreaking


(iOS) or rooting (Android) their devices to download from unofficial
third-party app stores (sideloading).

 Untrusted content can enter mobile devices via SMS, MMS, and RCS
text messaging.
 Mobile devices can access untrusted content using QR codes.
Attackers can create advertisements with QR codes containing
malicious URLs (QR code phishing or quishing).

Jailbreaking and Rooting

 Jailbreaking an iPhone involves exploiting vulnerabilities in iOS to


remove Apple's security restrictions, gaining root access and
installing unauthorized apps or modifications. Jailbreak tools exploit
kernel exploits to bypass security layers like secure boot
process, kernel memory protections, or sandboxing
mechanisms. Jailbreaking runs iOS in a restricted user mode,
preventing access to system files, but elevates user privileges to
root, allowing unrestricted control.

Security Risks of Jailbreaking

 Increased Malware Risk: Unauthorized apps can introduce spyware


or ransomware.

 Weakened System Integrity: Removing Apple's security layers


exposes the device to attacks.

 No Software Updates: Jailbroken devices may not receive Apple's


official security patches.

 App and Service Restrictions: Some apps (e.g., banking apps) detect
jailbreaking and refuse to run for security reasons.

Protecting Mobile Devices

Configurations to consider:

 Strong Authentication: Verifying the authentic user of a device


requires a strong passcode and restricts unauthorized users with a
screen lock. Options include passcodes, PINs, fingerprint or facial
recognition, and pattern connecting dots.

 Segmentation: Separating business data from personal data on


mobile devices using containerization. This separates storage into
business and personal "containers" and helps companies avoid data
ownership privacy issues and legal concerns.

 Enable Loss or Theft Services: Security features to locate a lost


or stolen device. If location is impossible, a remote wipe may be
necessary.

 Security features include:

 Alarm: Device generates an alarm if on mute.


 Last known location: If the battery is low, the device's last known
location is shown online.

 Locate: Current location is pinpointed on a map via GPS.

 Remote lockout: Mobile device can be remotely locked with a


custom message on the login screen.

 Thief picture: Taking a picture of users who enter incorrect


passcodes three times and emailing it to the owner.

 Mobile Device Management (MDM): Tools to remotely manage a


device by an organization.

 Mobile Application Management (MAM): Covers application


management, including tools and services for distributing and
controlling access to apps.

 Mobile Content Management (MCM): Supports the creation,


editing, and modification of digital content by multiple employees.

 Unified Endpoint Management (UEM): Provides capabilities for


managing and securing mobile devices, applications, and content.

You might also like