Explore tens of thousands of sets crafted by our community.
Mobile Security Threats
10
Flashcards
0/10
Malicious Apps
Apps with malicious code can compromise device security and steal user data. Mitigation includes downloading apps from reputable sources, checking app permissions, and using mobile security solutions.
Physical Device Theft
Loss or theft of a mobile device can result in unauthorized access to private information. To mitigate this risk, use strong passwords or biometrics, enable device tracking, and use remote wipe capabilities.
Man-in-the-Middle Attacks
Man-in-the-Middle (MitM) attacks intercept and potentially alter the communication between two parties without their knowledge. Use encrypted connections and SSL/TLS to mitigate this risk.
Rootkits
Rootkits are tools that enable administrator-level access to a device, often without the user's consent. Mitigation involves using sophisticated antivirus tools that can detect and remove rootkits.
Zero-Day Exploits
Zero-Day Exploits take advantage of a security vulnerability on the same day that the vulnerability becomes generally known. Protect against these by using security solutions that include behavior-based threat detection.
Phishing Attacks
Phishing is a fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication. Mitigation includes educating users on recognizing phishing attempts and implementing anti-phishing software.
Unpatched Software
Using outdated software with unpatched vulnerabilities can lead to compromised mobile security. Regular software updates and patch management are key mitigation strategies.
Social Engineering
Social engineering involves manipulating users to divulge confidential information. Defenses include being aware of manipulation tactics, not sharing personal info via untrusted sources, and employee training.
Insecure Wi-Fi Networks
Connecting to insecure Wi-Fi networks can expose mobile devices to eavesdropping and data interception. Mitigation involves using Virtual Private Networks (VPNs) and avoiding public Wi-Fi for sensitive transactions.
Spyware
Spyware is malware that is installed on a mobile device without the user's knowledge and transmits the user's information covertly. Mitigation includes using antivirus software and being cautious about granting app permissions.
© Hypatia.Tech. 2024 All rights reserved.