15.01.2024 Views

CompTIA A+ Certification All-in-One Exam Guide

  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Mobile OS and Application Security Issues

Security is a complicated, ever-evolving topic. We’ve already discussed

aspects of mobile device security at various points in the chapter, but there

are some additional security issues the user and organization need to be

aware of and take steps to prevent. We’ll begin with a discussion of tools you

can use to troubleshoot mobile OS and application security issues broadly,

and then turn to some of the common risks, symptoms, and clues related to

mobile security issues.

Troubleshooting Tools

While the foundation of good security is staying informed of new threats and

being vigilant about the patches, configuration updates, policy changes, antimalware

updates, and user re-education required to address these new threats,

this foundation is just about not giving attackers an easy win. Beyond this, we

have to cope with security issues that require constant vigilance: novel

threats, avoiding insecure applications, and irresolvable vulnerabilities.

Though your greatest assets are your own curiosity, instincts, and

persistence, you can augment these with a variety of technical tools for

troubleshooting mobile security issues. Let’s look at some of these tools,

grouped in terms of the issues they are most useful for addressing: network

attacks and app security.

Network Attacks

Device makers originally designed mobile devices to be gregarious by nature

—they are more useful this way—but network attacks can exploit such

openness. We’ll consider specific issues a little later in the “Unintended

Connections” section, and focus now on tools for identifying and mitigating

risks: device security settings, user training, Wi-Fi analyzers, and cell tower

analyzers.

Device Security Settings Because network attacks generally prey on

devices that are overeager to connect, the first step to mitigating these threats

is to make sure your devices won’t automatically connect to any open Wi-Fi

network or nearby Bluetooth device. You can apply these settings manually

on each device, but you can also use an MDM (remember, that’s a mobile

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!