13.3 - Mobile Devices

 13.3 - Mobile devices 

 

Key Terms: 

    • Mobile phishing attack – A social engineering attack used on mobile users to leak sensitive information. 
    • The Open Web Application Security Project (OWASP) - The organisation that publishes an annual Top 10 Mobile Risks list. 
    • Open source – Software code that is available to anyone without a fee. 
    • Rooting – Overriding security features on Android devices in order to modify, remove or replace applications. 
    • Jailbreaking – Overriding security features on an iOS device to sideload applications, run apps with administrator permissions and change system files. 
    • Sideloading – Downloading and installing unapproved apps on a mobile device. 
    • Mobile device management (MDM) - A term used to describe policies and procedures used by an organisation to maintain security and permissions on mobile devices. 
    • Bring-Your-Own-Device (BYOD) - A policy that allows employees to use their own devices for work purposes. 

 

Malicious Websites 

A malicious website is a website that contains malicious code and is ran by a hacker. The hacker can determine which devices are connecting to the site and run the appropriate malicious code for that device. 

 

Phishing 

Phishing attacks are generally more effective on mobile users. This is because mobile devices are usually used when doing other things such as watching TV or waiting for someone and so the victim is easily distracted and may not recognise an attack. Also, some mobile users are seen as less technical and may not understand social engineering as well. 

 

Data Loss 

Some apps send your personal data to corporate systems. This data is meant to be used for advertising purposes, but it is a very attractive target for hackers as it contains tons of data al stored in one place. 

 

Lost or Stolen Devices 

Mobile devices (as it states in the name) are mobile and portable. This means that it is very easy for someone to take a mobile device and steal all its data. 

 

Access Control 

This includes passwords, biometrics and two factor authentication. It controls who can access the mobile device and its data. It also controls application privileges, for example it would restrict some applications from full disk access as they don’t need it. 

 

Digital Signing 

Apps that are digitally signed means that they have been verified in their security and that they have not been tampered with. 

 

Encryption 

Encryption allows data to be transferred without the risk of leakage. Encryption can also happen for data stored on the mobile device. There are both software and hardware solutions for encryption. 

 

Isolation 

Application sandboxing is used to run an application without letting other applications access its resources. This means it is isolated from all the other applications which is more secure. 

 

Permission-based Access Control 

Mobile device applications are required to ask for permissions before they can use certain sensitive features like the microphone or camera. 

 

OWASP 2016 

    • M1 Improper Platform Usage – Mobiles device operating systems must provide security capabilities that are well documented and understood. App developers sometimes fail to do this correctly or even fail to provide this at all. 
    • M2 Insecure Data Storage – Applications leak data to corporate servers where they are attacked by hackers and data is stolen. 
    • M3 Insecure Communications – Communications which are not encrypted or secure allow hackers to access the data being communicated more easily. 

 

Vulnerable Conditions 

Mobile devices sometimes have no screen-lock password set or they are very weak. They are designed to easily connect to wireless networks and so they often make unprotected wireless connections. Of course, malware is a constant problem to data security and other sensitive fields. Malware is particularly easy to execute on mobile devices as they usually don’t contain any security software. Also, out-of-date operating systems can contain bugs and vulnerabilities that need to be fixed to stop hackers. 

 

Spyware 

Spyware applications can monitor sensitive information such as call history, text messages, emails, keystrokes, etc... They can also send this information to a command control server which the hacker controls. All of this is done without the user’s knowledge and consent. 

 

Android 

The Android operating system is developed by Google and is an open-source platform based on the Linux kernel. Lots of mobile device manufacturers like to use Android to lower their procurement costs when making mobile devices. Because Android is open source, hackers can also view the source code of the operating system and exploit weaknesses they find. Mobile device manufacturers first download the Android source code from a git repository called the Android Open-Source Project (AOSP). They customise the code and install an image onto the mobile devices. Even though manufacturers have customised Android images, the components that make up Android operating systems are the same. 

 

 

 

iOS 

iOS is a mobile operating system developed by Apple and installed on iPhones. iOS is not open source and can only be run on Apple hardware. For this reason, iOS is considered more secure than Android however, it is less documented. 

 

Mobile Security Model Areas 

Android 

iOS 

Traditional access controls 

 

 

 

Digital Signing 

 

 

 

Encryption 

 

 

 

Isolation 

 

 

 

Permissions-based access controls 

 

 

Comments

Popular posts from this blog

OSA Summer 2023 Mock - Task 1, Assignment 1

OSA Assignment 1 - Task 1 GUIDE

Useful Core A Acronyms