2.7 Securing Mobile and Embedded Devices
COMPTIA A+ CORE 2 - DOMAIN 2
Cyber Wizard
This article provides an in-depth guide on securing mobile and embedded devices through authentication, remote security features, encryption, and policy enforcement, as required for the CompTIA A+ exam.
CompTIA A+ Exam Domain: Domain 2.7 - Explain common methods for securing mobile and embedded devices.
Screen Locks and Authentication Methods
Screen locks prevent unauthorized access by requiring user authentication before accessing a device.
Types of Screen Locks
Facial Recognition:
Uses biometric data for authentication.
Enhanced security with liveness detection to prevent spoofing.
Commonly used in Apple Face ID and Android Face Unlock.
PIN Codes:
Requires a numeric code (4-8+ digits) to unlock the device.
Longer PINs (6+ digits) offer better security.
Fingerprint Scanner:
Uses biometric authentication via built-in sensors.
Found on many smartphones, tablets, and laptops.
Pattern Locks:
Requires users to draw a unique pattern.
Less secure due to visible smudge traces.
Swipe to Unlock:
Provides no security and should not be used on sensitive devices.
Remote Security Features
Remote Wipes
Allows administrators or users to erase all data remotely in case of theft or loss.
Available through Mobile Device Management (MDM) solutions or native OS features like:
Find My iPhone (Apple)
Google Find My Device (Android)
Ensures sensitive information remains protected.
Locator Applications
Uses GPS tracking to locate lost or stolen devices.
Can remotely lock the device or send alerts.
Examples:
Find My iPhone (Apple)
Google Find My Device (Android)
System Security Measures
OS Updates
Patches security vulnerabilities and improves performance.
Enables automatic updates for timely security fixes.
Reduces risk of malware exploiting known system flaws.
Device Encryption
Protects stored data by making it unreadable without authentication.
Full Disk Encryption (FDE): Used in Android (File-Based Encryption) and Apple’s FileVault.
Prevents unauthorized access to sensitive data.
Remote Backup Applications
Ensures data is recoverable in case of device loss or failure.
Examples:
iCloud Backup (Apple)
Google Drive Backup (Android)
Third-party cloud services (OneDrive, Dropbox, Syncthing)
Encrypted backups protect data integrity.
Access and Network Security
Failed Login Attempt Restrictions
Limits login attempts to prevent brute-force attacks.
Common settings:
Lock the device after 5-10 failed attempts.
Require multi-factor authentication (MFA) for high-security environments.
Enable automatic wipe after excessive failed login attempts (optional).
Antivirus and Anti-Malware Protection
Protects against malicious applications and network-based threats.
Examples:
Microsoft Defender (Windows Mobile)
Malwarebytes (Android/iOS)
Avast Mobile Security
Conducts real-time scanning and threat detection.
Firewalls
Controls network traffic to prevent unauthorized access.
Built-in mobile firewalls:
Android Firewall Apps: NoRoot Firewall, NetGuard.
iOS Firewalls: Managed through VPN security policies.
Enterprise deployments often use MDM-enforced firewall rules.
Policies and Procedures
BYOD vs. Corporate-Owned Policies
Bring Your Own Device (BYOD):
Employees use personal devices for work.
Security risks: Data leakage, uncontrolled apps, unauthorized access.
Requires MDM enforcement to separate personal and work data.
Corporate-Owned Devices:
Fully managed by IT admins with strict security policies.
Enforces remote management, access control, and app restrictions.
Higher security but reduced user flexibility.
Profile Security Requirements
Defines access control and security settings for different user roles.
Examples:
Enforcing work profile separation (Android Enterprise, iOS MDM profiles).
Restricting data-sharing between apps to prevent unauthorized access.
Mandating VPN use for remote work security.
Internet of Things (IoT) Security
IoT devices, including smart home devices, wearables, and industrial controllers, require special security measures.
Change Default Credentials: Default usernames and passwords must be changed immediately.
Enable Network Segmentation: Isolate IoT devices from primary networks.
Disable Unused Features: Turn off unnecessary services like Bluetooth, remote access, and UPnP.
Apply Firmware Updates: Regular patches prevent exploitation of vulnerabilities.
Monitor Network Traffic: Use intrusion detection systems (IDS) to detect unauthorized activity.
Additional Security Considerations
Application Security
Install applications only from trusted sources (Google Play Store, Apple App Store).
Enable app permissions management to restrict access to sensitive data.
Use sandboxing techniques to isolate app processes.
Virtual Private Networks (VPNs)
Encrypts network traffic to prevent eavesdropping and MITM attacks.
Recommended for public Wi-Fi security.
Corporate environments often enforce VPN usage for remote employees.
Mobile Device Management (MDM) and Enterprise Security
Used to enforce corporate security policies on mobile devices.
Features include:
Remote device monitoring and management.
Enforced encryption and compliance checks.
Geofencing restrictions for access control.
Selective wipe for corporate data without erasing personal files.
Final Thoughts
Securing mobile and embedded devices requires a combination of authentication methods, encryption, remote security, network protections, and policy enforcement. The CompTIA A+ exam evaluates an IT professional’s ability to implement security measures to mitigate threats and enhance mobile security.