Mobile Communications & IoT Security Risks

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/25

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts related to mobile communications and IoT attacks, their methodologies, vulnerabilities, and protections based on OWASP guidelines.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

What are the three main attack avenues for mobile and IoT devices?

Device, Network, Data center/cloud.

2
New cards

What type of vulnerability does M2 of the OWASP Mobile Top 10 refer to?

Insecure data storage.

3
New cards

Name one tool used for vulnerability scanning in mobile and IoT environments.

Nmap.

4
New cards

What does rooting ensure on an Android device?

Gaining administrative privileges.

5
New cards

What does the term 'smishing' refer to?

SMS phishing.

6
New cards

List the three methods of jailbreaking an iOS device.

Userland, iBoot, BootROM.

7
New cards

What does OWASP I1 refer to in IoT security?

Weak guessable or hardcoded passwords.

8
New cards

What is the role of a gateway in IoT?

It collects and sends data to the cloud.

9
New cards

M1 in the OWASP Mobile Top 10 addresses what issue?

Improper platform usage.

10
New cards

What attack involves rogue Access Points?

DNS cache poisoning.

11
New cards

Define 'Bluebugging' in the context of Bluetooth attacks.

Gaining unauthorized access to a Bluetooth-enabled device.

12
New cards

What does the OWASP IoT I6 address?

Insufficient privacy protection.

13
New cards

What methodology involves information gathering using Shodan?

Vulnerability assessment.

14
New cards

What type of attack does 'Bluesniffing' refer to?

Intercepting Bluetooth communications to capture data.

15
New cards

What vulnerability is addressed by M8 in the OWASP Mobile Top 10?

Code tampering.

16
New cards

What does maintaining access refer to in an attack methodology?

Ensuring continued control over a compromised system.

17
New cards

In IoT, what is the significance of middleware?

Facilitates communication between applications and networks.

18
New cards

What vulnerability does I4 of the OWASP IoT Top 10 highlight?

Lack of secure update mechanism.

19
New cards

What does 'bluesnarfing' allow an attacker to do?

Access and steal information from a Bluetooth-enabled device.

20
New cards

What is a characteristic of insecure data transfer/storage?

Data is not adequately protected during transmission or at rest.

21
New cards

What kind of attacks can utilize phishing?

Social engineering attacks that deceive individuals to gain confidential information.

22
New cards

In mobile security, what does 'client code quality' refer to?

The security and performance of the code on the client side.

23
New cards

What does I5 of the OWASP IoT Top 10 address?

Use of insecure or outdated components.

24
New cards

Define the purpose of 'reverse engineering' as categorized in OWASP M9.

Analyzing an application's code or structure to find vulnerabilities.

25
New cards

What are the roles of edge technology in IoT?

It processes data close to the source before sending it to the cloud.

26
New cards

What attack method uses Telnet?

Remote access to a device for exploitation purposes.