CompTIA Security+ (SY0-601): Mobile Device Security
This section focuses on mobile security concerns such as SIM cloning, Bluetooth-based attacks (bluejacking and bluesnarfing), and geotagging risks. It also highlights device management strategies like BYOD and CYOD, emphasizing storage segmentation to protect corporate data on personal devices.
SIM & SIM Cloning
Subscriber Identity Module:
Integrated circuit that securely stores the international mobile subscriber identity (IMSI) number and its related key
SIM Cloning:
Allows two phones to utilize the same service and allows an attacker to gain access to the phone’s data
SIM v1 cards were easy to clone but newer SIM v2 cards are much harder
Be careful with where you post phone numbers
Key Terms
SIM & SIM Cloning
Subscriber Identity Module:
Integrated circuit that securely stores the international mobile subscriber identity (IMS...
Bluejacking & Bluesnarfing
Bluejacking:
Sending of unsolicited messages to Bluetooth-enabled devices
Bluesnarfi...
Geotagging
Embedding of the geolocation coordinates into a piece of data (i.e., a photo)
BYOD: Storage Segmentation
Creating a clear separation between personal and company data on a single device
CYOD: ...
MDM
Mobile Device Management:
Centralized software solution for remote administration and c...
MCM
Mobile Content Management:
Secure access to data
Prote...
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
SIM & SIM Cloning | Subscriber Identity Module: SIM Cloning: |
Bluejacking & Bluesnarfing | Bluejacking: Bluesnarfing: |
Geotagging | Embedding of the geolocation coordinates into a piece of data (i.e., a photo) |
BYOD: Storage Segmentation | Creating a clear separation between personal and company data on a single device CYOD: Choose Your Own Device |
MDM | Mobile Device Management: Centralized software solution for remote administration and configuration of mobile devices |
MCM | Mobile Content Management: Secure access to data Protect data from outsiders DLP Ensuring data is encrypted |
MAM | Mobile Application Management: Provision, update & remove apps Keep everyone on same version Can create an enterprise app catalog Monitor app use Remote wipe app data |
SEAndroid | Security Enhancements for Android NSA project |