Back to AI Flashcard MakerInformation Technology /CompTIA Security+ (SY0-601): Mobile Device Security

CompTIA Security+ (SY0-601): Mobile Device Security

Information Technology8 CardsCreated 3 months ago

This section focuses on mobile security concerns such as SIM cloning, Bluetooth-based attacks (bluejacking and bluesnarfing), and geotagging risks. It also highlights device management strategies like BYOD and CYOD, emphasizing storage segmentation to protect corporate data on personal devices.

SIM & SIM Cloning

Subscriber Identity Module:
Integrated circuit that securely stores the international mobile subscriber identity (IMSI) number and its related key

SIM Cloning:
Allows two phones to utilize the same service and allows an attacker to gain access to the phone’s data
SIM v1 cards were easy to clone but newer SIM v2 cards are much harder
Be careful with where you post phone numbers

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/8

Key Terms

Term
Definition

SIM & SIM Cloning

Subscriber Identity Module:
Integrated circuit that securely stores the international mobile subscriber identity (IMS...

Bluejacking & Bluesnarfing

Bluejacking:
Sending of unsolicited messages to Bluetooth-enabled devices

Bluesnarfi...

Geotagging

Embedding of the geolocation coordinates into a piece of data (i.e., a photo)

BYOD: Storage Segmentation

Creating a clear separation between personal and company data on a single device

CYOD: ...

MDM

Mobile Device Management:

Centralized software solution for remote administration and c...

MCM

Mobile Content Management:

Secure access to data

Prote...

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

SIM & SIM Cloning

Subscriber Identity Module:
Integrated circuit that securely stores the international mobile subscriber identity (IMSI) number and its related key

SIM Cloning:
Allows two phones to utilize the same service and allows an attacker to gain access to the phone’s data
SIM v1 cards were easy to clone but newer SIM v2 cards are much harder
Be careful with where you post phone numbers

Bluejacking & Bluesnarfing

Bluejacking:
Sending of unsolicited messages to Bluetooth-enabled devices

Bluesnarfing:
Unauthorized access of information from a wireless device over a Bluetooth connection

Geotagging

Embedding of the geolocation coordinates into a piece of data (i.e., a photo)

BYOD: Storage Segmentation

Creating a clear separation between personal and company data on a single device

CYOD: Choose Your Own Device

MDM

Mobile Device Management:

Centralized software solution for remote administration and configuration of mobile devices

MCM

Mobile Content Management:

Secure access to data

Protect data from outsiders

DLP

Ensuring data is encrypted

MAM

Mobile Application Management:

Provision, update & remove apps

Keep everyone on same version

Can create an enterprise app catalog

Monitor app use

Remote wipe app data

SEAndroid

Security Enhancements for Android
SELinux in the Android OS
Supports access control security policies

NSA project
Prevent malicious activity
MAC & DAC