Pass your certification exam. Faster. Guaranteed.

Join the 40,000+ candidates in over 58 countries that have found a faster, better way to pass their certification exam.

BASIC

Comprehensive practice exam engine!

  • Unlimited access to thousands of practice questions
  • Exam readiness score
  • Smart reinforcement

PRO

All features in the FREE plan, plus:

  • Focused training ensures 100% exam readiness
  • Personalized learning plan
  • Align exam engine to your current baseline knowledge
  • Eliminate wasted study time
  • Exam pass guarantee
  • And much more

Mobile Systems Transcription

Welcome to our mobile systems vulnerabilities and threats module. You have several different threats that you need to be concerned with with mobile devices. With remote computing, you need to make sure that you trust your clients, you have network architectures in place to prevent unauthorized users from connecting to your network.

You need to make sure that you have proper policies in place and determine how you will deal with stolen or lost devices. As technology evolves, you will have many more mobile workers in your organization. There are many platforms that are becoming available to users, which make this much simpler.

You also have to be concerned with individuals that are synching data with home computers and other devices, especially if that individual then leaves the company. Your primary concern with protecting smartphones should be the loss or theft of the smartphone and the data that it contains. PINs or passcodes on the home screen are a first line of defense if the phone is lost or stolen, the person who finds the device will not be able to easily access the content.

You should use security applications that allow you to remotely locate the phone using GPS. And also remotely wipe any sensitive data. You should enable encryption if possible. AES is commonly used to encrypt removable SD cards that may be in your cellular devices. And WTLS is used to enable encryption between the cellphone device and cellphone tower.

You should only use trusted applications from trusted sources. You should not use applications that are from unrecognized or unverified application stores. You should turn off or uninstall any apps that are not necessary to use on the phone. You should also make sure that you patch the phone's operating system and keep it as up to date as possible.

You should not modify your phone's operating system by jailbreaking it or rooting it because this increases the vulnerabilities in the device and the chances that someone will be able to access it without permission. You should install antivirus software if you are not using an Apple iOS device. And you should also consider a pop-up blocker to prevent adware from occurring.

You should turn of Bluetooth discovery to prevent bluejacking and bluesnarfing attacks and you should not use public Wi-Fi hotspots because of the possibility of evil twin attacks. Where an individual sets up a rogue access point in an attempt to get users to connect to it, so that they can capture the data the user is transmitting.

You should also make sure that you back up all of the data that's on the device, either to a cloud storage service or to the user's personal computer. Here, we take a look at some of the attack vectors and targets that may affect mobile devices. You can be attacked through SMS Short Messaging Service, which is text messaging, Wi-Fi, infrared, Bluetooth, USB.

Through the device's web browser or email client, through third-party applications, by jailbreaking the device, operating system vulnerabilities, and of course unauthorized physical access to the device. Once an intruder is able to gain access to the device, they have many different targets that they can go after. SMS messages or text messages, phone conversations, email messages, media files, such as pictures, videos, audio files, social networking applications, location information, Ddocuments, voice recordings, and user names and passwords or other credentials or sensitive information.

Bluetooth attacks are common, such as bluejacking, where an individual sends spam anonymously to victims. And bluesnarfing which is where an individual steals information from a device via Bluetooth. You should be familiar with both of these attacks for the CISSP examination. Blue boff is an exploit where an individual can create overflows in services remotely.

And BlueBug uses AT commands on the victim's cell phone. You should always disable Discovery to eliminate the threat of Bluetooth attacks on your device. And you should remember that disabling Discovery is important for the CISSP examination. Individuals can also attempt to clone or spoof phone data such as serial numbers in order to make free phone calls, often internationally and bill it to another user.

Attackers can purchase automatic scanners to search for phones that may be vulnerable. If you implement bring your own device, or BYOD, in your organization, there are some challenges that you should be concerned with. The first step is to do a risk analysis before you deploy any mobile technologies and make sure that everything fits in with your business processes.

When you have a user-owned mobile device, this is a significant threat to your information security because your confidentiality, integrity, and availability, could be at risk. You'll have to consider the risks versus the benefits before you make a decision. If you decide to implement a BYOD policy, you should invest in a good mobile device management or MDM infrastructure in order to protect your network.

You should limit the devices and operating systems that you support so that you do not have to support many different types of devices and different operating systems. You should have a whitelist of applications that you trust, and only allow users to install those applications. You should disable access to corporate assets for most users, unless they have a need to access that information.

You should provide bandwidth limits to avoid Netflix or other streaming video usage on the devices. And you should require encryption to be used in order to protect the sensitivity of the data on the device. You should never allow rooted or jailbroken devices. Because these devices have increased security issues and therefore you do you not want them on your network. Mobile device management is an infrastructure tool which can help to protect your bring your own device environments. You'll be able to control many of the devices' functions remotely using a server in your company. Laptops, tablets, and smartphones, whether personally owned, or company owned, can be controlled using this type of server.

A client component runs on each of the device in order to control it. You can enforce encryption settings, force users to use a lock screen password, provide antivirus updates and make sure that the devices are patched and up to date. You can modify or apply settings remotely, rapidly enroll new users devices which is known as onboarding.

You can display an acceptable use policy that requires your user to consent to being monitored and consent to your policies before you allow them on your corporate network. These systems typically allow over the air or ota updates so that your employees' devices can be updated wirelessly without them having to connect to a computer.

They also allow you to quickly remove devices known as offboarding for individuals who are terminated or are no longer with the company, or if a device is lost or stolen. There are several good choices that you can look into for mobile device management, including Sophos and Airwatch. This concludes our mobile systems, vulnerabilities, and threats modual.

Thank you for watching.

Included in all plans.

1000's of practice test questions

Classified by skill and ranked by difficulty. Choose to answer questions in STUDY MODE to review and you go.

Exam Readiness Score

Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.

Smart Reinforcement

Don’t forget what you’ve just studied! Use the intelligent reinforcement questions to stay fresh.

THANK YOU! Just bloody thank you! I’m doing the CEH minor at my college and well...I’ve learned more from this site in a few hours than I’ve learned from my school in 9 weeks about the subject. Keep up the good work!

PRO Membership Benefits.

Personalized Learning Plan

Skillset’s Exam Engine continuously assesses your knowledge and determines when you are ready take and pass your exam. When Skillset learns that there is a gap between your knowledge and what you need to know to pass, we present you with a focused training module that gets you up to speed quickly. No fluff! Find your knowledge gaps and fill them.

Exam Pass Guarantee

Skillset is confident that we can help anyone pass their exam. If you reach 100% readiness, and you do not pass your exam, we will refund you plus pay for a replacement exam voucher. That’s how powerful our learning system is, we can offer this guarantee and stand behind our products with this no risk to you guarantee. See terms and conditions.

Eliminate Wasted Study Time

Don’t waste time studying concepts you have already mastered. Focus on what you need to know to pass. The Skillset Competency Diagnostic aligns our Exam Engine and Learning Plan to your baseline knowledge. This saves an average of 31% of the time required to prep for a professional certification exam.

Coming Soon - Simulated Exam

More PRO benefits are being built all the time!