Page 625 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 625

Protected Access 2 (WPA2) encrypted wireless networks by linking
                  with the wireless access point via NFC. Because NFC is a radio-

                  based technology, it isn’t without its vulnerabilities. NFC attacks
                  can include man-in-the-middle, eavesdropping, data
                  manipulation, and replay attacks.




               GPS

               Many mobile devices include a Global Positioning System (GPS) chip
               to support and benefit from localized services, such as navigation, so
               it’s possible to track those devices. The GPS chip itself is usually just a
               receiver of signals from orbiting GPS satellites. However, applications
               on the mobile device can record the GPS location of the device and

               then report it to an online service. You can use GPS tracking to
               monitor your own movements, track the movements of others (such as
               minors or delivery personnel), or track down a stolen device. But for
               GPS tracking to work, the mobile device must have internet or wireless
               phone service over which to communicate its location information.


               Application Control

               Application control is a device-management solution that limits which

               applications can be installed onto a device. It can also be used to force
               specific applications to be installed or to enforce the settings of certain
               applications, in order to support a security baseline or maintain other
               forms of compliance. Using application control can often reduce
               exposure to malicious applications by limiting the user’s ability to
               install apps that come from unknown sources or that offer non-work-
               related features.


               Storage Segmentation


               Storage segmentation is used to artificially compartmentalize various
               types or values of data on a storage medium. On a mobile device, the
               device manufacturer and/or the service provider may use storage
               segmentation to isolate the device’s OS and preinstalled apps from
               user-installed apps and user data. Some mobile device-management
               systems further impose storage segmentation in order to separate
   620   621   622   623   624   625   626   627   628   629   630