mobile

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/59

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:47 AM on 5/1/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

60 Terms

1
New cards
What does MDM stand for?
Mobile Device Management Manages, secures, and monitors mobile devices in enterprise environments
2
New cards
What is MDM composed of?
on- device applications and configurations, corporate policies and certificates backend infrastructure
3
New cards
Is MDM centralized or Decentralized?
Centralized
4
New cards
How does management take advantage of MDM?
Full Management Device enrollment Configuration management Security enforcement Application distribution Monitoring
5
New cards
Does MDM focus on all devices?
No, only mobile devices EMM  adds wearables, IoT UEM  combines MDM & EMM with a unified approach
6
New cards
What does EMM stand for?
Enterprise Mobility Management
7
New cards
What does UEM stand for?
Unified Endpoint Management
8
New cards
What are the key components of MDM?
Device Enrollment: Process of registering and configuring mobile devices to be managed by the MDM solution. Device Inventory: Maintaining centralized inventory of all managed devices including device details and status. Configuration Management: Applying and enforcing security policies, settings, and configurations across managed devices. Security Management: Implementing security measures to protect devices and corporate data such as encryption, passcode policies, and remote wipe capabilities. Application Management: Distributing, updating, and managing corporate applications on mobile devices including app installation and removal. Monitoring and Reporting: Monitoring device status, security compliance, and usage patterns, and generating reports for analysis.
9
New cards
What are the security features and policies of MDM?
Passcode Policies: Enforcing passcode complexity, length, and expiration requirements on managed devices. Data Encryption: Encrypting data stored on devices and during transmission to prevent unauthorized access. Remote Lock and Wipe: Capability to remotely lock or wipe lost or stolen device to protect sensitive data. Network Security: Implementing VPN, firewall, and Wi- Fi security measures to secure device connections. Compliance Enforcement: Ensuring devices adhere to regulatory compliance standards and organizational security policies.
10
New cards
What are some examples of real-world industrial tools for MDM?
IBM MaaS360 Citrix Endpoint Management
11
New cards
Is it possible to use MDM for personally-owned devices, or only company-assigned ones?
It is possible to use MDM for personal devices BYOD devices (Bring Your Own Device)  Personal devices that are used for work and owned by the employee, not the company
12
New cards
What are the 2 MDM Deployment modes?
On-premises Cloud
13
New cards
Secure
Mobile Application 27 Cloud- Based MDM: Service Delivery Model: Cloud- based MDM solutions are delivered as service by third- party providers, with the MDM infrastructure hosted and managed off- site in the provider's data centers. Scalability and Flexibility: Cloud- based MDM offers scalability and flexibility allowing organizations to easily scale their MDM deployments up or down based on changing business needs, without the need for additional hardware investments. Accessibility: Users can access the MDM solution from anywhere with an internet connection enabling remote management of devices and users across distributed locations. Automatic Updates: Cloud- based solutions typically receive automatic updates and patches from the provider ensuring that the MDM software is always up- to- date with the latest features and security enhancements. Cost Considerations: Cloud- based MDM often follows subscription- based pricing model where organizations pay recurring fee based on usage or the number of managed devices, potentially reducing upfront costs and simplifying budgeting
14
New cards
How can MDM be used for security?
Containerization Secure email Secure browsing Secure documents Secure app catalog
15
New cards
What are the 2 perspectives for BYOD security guidelines?
Administrator Employee
16
New cards
What is app repackaging?
Extracting the details of an app
17
New cards
What are the key security features that Android provides?
Robust security at the OS level through the Linux kernel Mandatory application sandbox for all applications Secure interposes (IPC) communication Application signing Application- defined and user- granted permissions
18
New cards
The Android security model is based on ______
The Linux security model
19
New cards
What is a UID?
User Identifier  A unique ID used to protect an app’s data
20
New cards
What is the IPC?
IPC is inter- process communication. It describes the mechanisms used by different types of android components to communicate with one another. Activities are interactive screens used to communicate with users. Intents are used to specify an Activity. Intents are messages which components can send and receive. It is universal mechanism of passing data between processes. With help of the intents one can start services or activities, invoke broadcast receivers and so on. Broadcasts provide way to send messages between applications. When sending broadcast, an application puts the message to be sent into an Intent. Services are background processes that toil away quietly in the background Content Providers provide way to efficiently share relational data between processes securely. They are based on SQL. Bundles are entities of data that is passed through. It is similar to the serialization of an object, but much faster on android. Bundle can be read from intent via the getExtras () method. It is commonly used to bridge Java and native code running in separate processes. Binders are the entities which allow activities and services to obtain reference to another service. It allows not simply sending messages to services but directly invoking methods on them.
21
New cards
What is the purpose of application signing?
The signed application certificate defines which user id is associated with which application. Application signing ensures that one application cannot access any other application except through well-defined IPC.
22
New cards
Can apps be installed without signatures?
No, Google Play or the Android package installer will reject it.
23
New cards
What are the 2 categories of application assets?
Information: the data to protect Function: the processes and capabilities to protect
24
New cards
Which 3 perspectives did we cover for information assets?
Managed by smartphone – things that are stored on the device itself Managed by application – Data that apps create and manage Managed by contact entry – Data belonging to OTHER users
25
New cards
How many different types of threats exist for a mobile application?
Network-based Third-Party Threat Due to User-Installed Malware Threat of an Malicious File that Exploits a Vulnerability in an Application Threats from a Malicious Smartphone User Threats from Third Party in the Proximity of a Smartphone
26
New cards
What does a network-based third party do?
may access (sniff) any information during this communication or try to change information (data manipulation). The malicious attacker in the middle (also referred to as “Man in The Middle”) can also pretend to be the real server tricking the application. Network-based malicious third parties will usually try to attack the server as well.
27
New cards
Which threat involves abusing the ADB?
Threats from a Malicious Smartphone User
28
New cards
What does GSM stand for?
Global System for Mobile  Developed to communicate voice and data
29
New cards
What does each generation of cellular communication provide?
1G – Voice only 2G – Voice and data 3G – Voice, data, and video and (internet) 4G – Enhanced 3G capabilities
30
New cards
What are the 3 main parts of any GSM architecture?
MOBILE STATION (MS): - ME: The physical phone hardware - SIM: The identity card — this is where security lives on the user side BASE STATION SUBSYSTEM (BSS): - BTS: The radio tower — just transmits/receives signals - BSC: The controller — manages multiple towers, handles handoffs NETWORK SWITCHING SUBSYSTEM (NSS): - MSC: Routes calls, like a telephone exchange - HLR: Master database of all subscribers (security-critical!) - VLR: Temporary database for roaming users - AUC: Authentication Center — generates security keys
31
New cards
What does SIM stand for?
Subscriber Identity Module
32
New cards
What is the difference between HLR and VLR?
HLR = Home Location Register A permanent database for permanent mobile subscribers VLR = Visitor Location Register A temporary database for users that do not belong to the main service provider network e.g., travellers
33
New cards
What is the 3GPP?
rd Generation Partnership Project Unites 7 telecommunications standards organizations Specifies cellular communication technologies Makes the systems backwards and forwards compatible
34
New cards
Was there security in 1G?
No
35
New cards
Is 1G digital or analog
Analog
36
New cards
Which cellular generation does GSM refer to?
2G
37
New cards
Which generation introduced SIM?
2G
38
New cards
What is 2G’s weakness?
The operators only authenticated the UEs (User Equipment) in a unilateral mechanism, whereas the UEs had no option to authenticate the operator
39
New cards
Which generation does UMTS refer to?
3G
40
New cards
What was the security with 3G?
The encryption in 3G is only applicable between the UE and the base station, and there is no encryption applied to the data when it leaves the base station and reaches the wired network 🡺 To be fully secure, we must overlay our security with SSL/TLS, SSH, or a VPN tunnel.
41
New cards
What does LTE stand for?
Long-Term Evolution
42
New cards
What is 5G NR?
NR = New Radio 5G NR (New Radio) is a new radio access technology (RAT) developed by 3GPP for the fifth generation (5G) mobile network. It was designed to be the global standard for the air interface of 5G networks. While the 3GPP standardization process was ongoing, the industry had already begun efforts to implement infrastructure compliant with the draft standard, with the first large-scale commercial launch of 5G NR having occurred in the end of 2018. Since 2019, many operators have deployed 5G NR networks and handset manufacturers have developed 5G NR enabled handsets. 5G NR must be able to: deliver a huge number of varied services provided across a diverse set of devices with different performance and latency requirements; support a wide range of deployment models from traditional macro to hotspot deployments; and allow new ways for devices to interconnect, such as device-to-device and multi-hop mesh. And it must do all this at unprecedented levels of cost, power and deployment efficiencies.
43
New cards
What is a UE?
User Equipment Mobile device SIM/UICC
44
New cards
What is the difference between IMEI and IMSI
IMEI  unique equipment/device identifier  tied to device IMSI  unique subscriber identifier  tied to SIM
45
New cards
What is an
eNodeB The radio component of the network  Tower
46
New cards
What is an EUTRAN?
A network of eNodeBs
47
New cards
What is the EPC?
Evolved Packet Core Consists of different components: Packet Data Gateway (P-GW) Allocates IP addresses and routes packets Interconnects with non 3GPP networks Serving Gateway (S-GW) Router of information between the P-GW and the E-UTRAN Carries user plane data, anchors UEs for intra- eNodeB handoffs 🡺 when use device moves across base stations Mobility Management Entity (MME) Primary signaling node - does not interact with user traffic Functions include managing & storing UE contexts, creating temporary IDs, controlling authentication functions, & selecting the S-GW and P-GWs Home Subscriber Server (HSS) Houses subscriber identifiers and critical security information
48
New cards
What are the 2 communication planes
User Plane Control Plane
49
New cards
How many parts make up the IMSI?
MCC  country code MNC  network code MSIN  subscriber ID
50
New cards
What are the 4 parts of the LTE security architecture?
SIM/UICC Device and network authentication Air interface protection Backhaul and network protection
51
New cards
What is the purpose of the UICC?
Hardware storage location for sensitive information Stores pre-shared key K 🡺 K is SIM-specific injected by the SIM manufacturer or telco operator Stores IMSI Limited access to the UICC via a restricted API Performs cryptographic operations for authentication
52
New cards
What happens in device and network authentication?
Authentication and Key Agreement (AKA) is the protocol used for devices to authenticate with the carrier to gain network access The cryptographic keys needed to encrypt calls are generated upon completion of the AKA protocol
53
New cards
What happens in device and network authentication?
1. Phone sends IMSI (or temporary identity GUTI) to network 2. Network's HSS generates a random challenge (RAND) and computes expected response using K 3. Network sends RAND to phone 4. Phone's UICC computes response using its K and RAND 5. Phone sends response to network — network verifies it matches expected response 6. Phone ALSO verifies the network's authentication token (AUTN) — this is the mutual part 7. Both sides derive session encryption keys from this exchange
54
New cards
What is a Backhaul?
The connection between eNodeBs and the EPC through the SGW
55
New cards
Is the Backhaul protected by default?
No
56
New cards
What is a Renegotiation Attack?
Rogue base stations can force a user to downgrade to GSM or UMTS. Mitigation: Ensure LTE network connection. Most current mobile devices do not provide the ability to ensure a user's mobile device is connected to an LTE network. ‘Use LTE only’ option is available to the user Use a rogue base station detector
57
New cards
What are the benefits of BYOD?
(1) Increased productivity, (2) Employee satisfaction, (3) Work flexibility, (4) Lower costs
58
New cards
What are the risks with BYOD?
Sharing confidential data on unsecured networks, Data leakage and endpoint security issues, Improperly disposing of devices, Mixing personal and private data, Lost or stolen devices, Lack of awareness, Ability to bypass organization's network policies, Infrastructure issues, Disgruntled employees
59
New cards
What are the steps to implementing a BYOD policy?
(1) Select the devices of your choice, (2) Define your requirements and build a technology portfolio, (3) Develop policies, (4) Security, (5) Support
60
New cards