Page 620 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 620

Assess and Mitigate Vulnerabilities in Mobile

               Systems


               Smartphones and other mobile devices present an ever-increasing
               security risk as they become more and more capable of interacting

               with the internet as well as corporate networks. When personally
               owned devices are allowed to enter and leave a secured facility without
               limitation, oversight, or control, the potential for harm is significant.

               Malicious insiders can bring in malicious code from outside on various
               storage devices, including mobile phones, audio players, digital
               cameras, memory cards, optical discs, and Universal Serial Bus (USB)
               drives. These same storage devices can be used to leak or steal internal

               confidential and private data in order to disclose it to the outside
               world. (Where do you think most of the content on WikiLeaks comes
               from?) Malicious insiders can execute malicious code, visit dangerous
               websites, or intentionally perform harmful activities.




                             A device owned by an individual can be referenced using

                  any of these terms: portable device, mobile device, personal mobile
                  device (PMD), personal electronic device or portable electronic
                  device (PED), and personally owned device (POD).



               Mobile devices often contain sensitive data such as contacts, text
               messages, email, and possibly notes and documents. Any mobile
               device with a camera feature can take photographs of sensitive

               information or locations. The loss or theft of a mobile device could
               mean the compromise of personal and/or corporate secrets.

               Mobile devices are common targets of hackers and malicious code. It’s
               important to keep nonessential information off portable devices, run a
               firewall and antivirus product (if available), and keep the system
               locked and/or encrypted (if possible).


               Many mobile devices also support USB connections to perform
               synchronization of communications and contacts with desktop and/or
   615   616   617   618   619   620   621   622   623   624   625