Course Hero Logo

module12.pdf - Security Awareness and Fingerprinting Mobile...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 3 out of 13 pages.

Security Awareness and FingerprintingMobile DevicesModes of LearningFor this module, the following modes of learning will be used:Online ReadingsOnline DiscussionsTextbook ReadingsSelf-QuizzesOverviewWelcome to the last content module in the Wireless and Mobile Device Security course.We completethis course with a look at the various Mobile Device vulnerabilities and attacks and how they can affectthe individual mobile user as well as risks for companies. As we talk through the vulnerabilities andattacks we also cover the various methods to mitigate these risks.The last major topic of this course isfingerprinting devices, where we look at the various techniques used to identify a mobile device that hasjoined a network.You will probably notice that many points and concepts mentioned in this module overlap with similarcontent in other modules. That is to be expected as the difference between Wireless devices and Mobiledevices gets smaller as the different functionality between the two technologies merges.As you begin this module, please refer to the timeline and make note of any assessments or importantdates. If you have any questions, ask your instructor.Learning OutcomesUpon completion of this module, you will be able to:1.List some of the most common ways to protect mobile devices from hackers2.Demonstrate mobile security awareness3.Outline the methods of fingerprinting mobile devices4.Analyze the types and methods of fingerprinting5.Analyze spyware for mobile devices and their unique identifiersKey Terms & ConceptsList some important key terms and concepts within this module.Client-Side VulnerabilitiesCookiesData LeakageInternational Mobile Station Equipment (IMEI)
Kali LinuxPhishing ExploitsServer-Side VulnerabilitiesSpywareStingRaySSIDerUnique Device Identifier (UDID)Mobile Security Awareness in CompaniesThe introduction of mobile devices into companies has opened up security issues that have to bemonitored and addressed on a constant basis.Hackers have shifted their attention from PC exploits tomobile smart devices for two main reasons, the simultaneous connection of a mobile device betweenpublic and corporate networks and the general lack of security awareness by end users.Any type of successful attack can bring with it a chance of lost data, financial losses, regulatory impacts,and potential damage to the reputation of the company.The best security practices in a company areabout mitigating unwanted network access exposures. This is usually done by building multiple layers ofsecurity defense in the network.The idea is that if one layer of security is compromised there is anothersecurity layer waiting behind it to stop the attack.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 13 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
N/A
Tags
Personal digital assistant, Wi Fi, Wireless access point

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture