Wednesday , January 23 2019
Home / Mobile / MOBILE DEVICE ATTACKS
MOBILE DEVICE ATTACKS

MOBILE DEVICE ATTACKS

A recent information security challenges is the number of mobile devices ranging from USB flash drives to laptops that are infected with malware outside of a security perimeter, and then carried into an organization.

Traditional network based protection, such as the firewalls and intrusion detection systems, are powerless to prevent the initial attacks.

Mobile device defenses

Defenses include administration controls such as restricting the use of mobile devices via policy.

Technical controls to mitigate infected mobile computers include requiring authentication at OSI model Layer 2 via 802.1X. 802.1X authentication may be bundled with additional security functionality, such as verification of current patches and antivirus signature.

Another mobile device security concern is the loss or theft of a mobile device, which threatens the confidentiality, integrity, and availability of the device and the data that resides on it.

Backups can assure the availability and integrity of the mobile data.

Full disk encryption (also which is known as whole disk encryption) ensures the confidentiality of mobile device data.

Remote wipe capability is another critical control, which describes the ability to erase and sometimes disable a mobile device that is lost or stolen.

About Mirza Ghalib

A Passionate Bloggers from Pakistan, Who Loves to Put Content That Talks About The Reality of Current Situations.

Check Also

Penetration Testing Mobile Devices Using Android

Penetration Testing Mobile Devices Using Android

Penetration Testing Mobile Devices: So how do we pen test mobile devices? In many ways …

2 comments

  1. I don’t even know how I ended up here, but I thought this post was great. I don’t know who you are but certainly you are going to a famous blogger if you aren’t already 😉 Cheers!

  2. Very nice post. I just stumbled upon your blog and wanted to say that I’ve really enjoyed browsing your blog posts. In any case I’ll be subscribing to your feed and I hope you write again soon!

Leave a Reply

Your email address will not be published. Required fields are marked *