15.01.2024 Views

CompTIA A+ Certification All-in-One Exam Guide

  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

from unapproved or unofficial sources. There are definitely legitimate app

sources outside of Google Play, such as device manufacturers,

communications carriers, and in-house corporate development sources. Some

sources are not so legitimate, and are usually unapproved by the vendors,

manufacturers, and corporate customers. You may also need to modify your

mobile OS to run some apps you obtain through unofficial channels. See

“Unauthorized Root Access,” later in the chapter, for more details.

When getting apps from questionable sources, risks include apps that

contain malware or steal personal data and transmit it to a third party.

Additionally, some apps require replacing the operating system with one

that’s not approved by the vendor; this not only invalidates the warranty on

most devices, but could cause the device to be unstable and not operate

properly.

Firewalls

While we’ll discuss them in greater depth in Chapter 27, for now it’s enough

to know that software firewalls on individual hosts protect them from

network-based threats. It isn’t completely clear what CompTIA expects you

to know about firewalling mobile devices. Generally, mobile devices don’t

use a firewall, because they don’t have lots of services listening on open ports

(like a traditional computer would). But, because they aren’t listening, you

can think of them as having a de facto firewall. The cellular and Wi-Fi

networks mobile devices use also employ firewalls to protect all networked

devices.

Depending on the OS, you may be able to find and install more traditional

software firewall packages. One example of a software firewall for Android

is shown in Figure 25-15. Android software firewall packages include basic

rule elements for constructing rules to filter specific traffic coming into the

host. Many of these packages also include solutions for anti-malware and

basic intrusion detection.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!