2.7 Securing Mobile and Embedded Devices

COMPTIA A+ CORE 2 - DOMAIN 2

Cyber Wizard

a cell phone sitting on top of a wall
a cell phone sitting on top of a wall

This article provides an in-depth guide on securing mobile and embedded devices through authentication, remote security features, encryption, and policy enforcement, as required for the CompTIA A+ exam.

CompTIA A+ Exam Domain: Domain 2.7 - Explain common methods for securing mobile and embedded devices.

Screen Locks and Authentication Methods

Screen locks prevent unauthorized access by requiring user authentication before accessing a device.

Types of Screen Locks

  • Facial Recognition:

    • Uses biometric data for authentication.

    • Enhanced security with liveness detection to prevent spoofing.

    • Commonly used in Apple Face ID and Android Face Unlock.

  • PIN Codes:

    • Requires a numeric code (4-8+ digits) to unlock the device.

    • Longer PINs (6+ digits) offer better security.

  • Fingerprint Scanner:

    • Uses biometric authentication via built-in sensors.

    • Found on many smartphones, tablets, and laptops.

  • Pattern Locks:

    • Requires users to draw a unique pattern.

    • Less secure due to visible smudge traces.

  • Swipe to Unlock:

    • Provides no security and should not be used on sensitive devices.

Remote Security Features

Remote Wipes

  • Allows administrators or users to erase all data remotely in case of theft or loss.

  • Available through Mobile Device Management (MDM) solutions or native OS features like:

    • Find My iPhone (Apple)

    • Google Find My Device (Android)

  • Ensures sensitive information remains protected.

Locator Applications

  • Uses GPS tracking to locate lost or stolen devices.

  • Can remotely lock the device or send alerts.

  • Examples:

    • Find My iPhone (Apple)

    • Google Find My Device (Android)

System Security Measures

OS Updates

  • Patches security vulnerabilities and improves performance.

  • Enables automatic updates for timely security fixes.

  • Reduces risk of malware exploiting known system flaws.

Device Encryption

  • Protects stored data by making it unreadable without authentication.

  • Full Disk Encryption (FDE): Used in Android (File-Based Encryption) and Apple’s FileVault.

  • Prevents unauthorized access to sensitive data.

Remote Backup Applications

  • Ensures data is recoverable in case of device loss or failure.

  • Examples:

    • iCloud Backup (Apple)

    • Google Drive Backup (Android)

    • Third-party cloud services (OneDrive, Dropbox, Syncthing)

  • Encrypted backups protect data integrity.

Access and Network Security

Failed Login Attempt Restrictions

  • Limits login attempts to prevent brute-force attacks.

  • Common settings:

    • Lock the device after 5-10 failed attempts.

    • Require multi-factor authentication (MFA) for high-security environments.

    • Enable automatic wipe after excessive failed login attempts (optional).

Antivirus and Anti-Malware Protection

  • Protects against malicious applications and network-based threats.

  • Examples:

    • Microsoft Defender (Windows Mobile)

    • Malwarebytes (Android/iOS)

    • Avast Mobile Security

  • Conducts real-time scanning and threat detection.

Firewalls

  • Controls network traffic to prevent unauthorized access.

  • Built-in mobile firewalls:

    • Android Firewall Apps: NoRoot Firewall, NetGuard.

    • iOS Firewalls: Managed through VPN security policies.

  • Enterprise deployments often use MDM-enforced firewall rules.

Policies and Procedures

BYOD vs. Corporate-Owned Policies

  • Bring Your Own Device (BYOD):

    • Employees use personal devices for work.

    • Security risks: Data leakage, uncontrolled apps, unauthorized access.

    • Requires MDM enforcement to separate personal and work data.

  • Corporate-Owned Devices:

    • Fully managed by IT admins with strict security policies.

    • Enforces remote management, access control, and app restrictions.

    • Higher security but reduced user flexibility.

Profile Security Requirements

  • Defines access control and security settings for different user roles.

  • Examples:

    • Enforcing work profile separation (Android Enterprise, iOS MDM profiles).

    • Restricting data-sharing between apps to prevent unauthorized access.

    • Mandating VPN use for remote work security.

Internet of Things (IoT) Security

IoT devices, including smart home devices, wearables, and industrial controllers, require special security measures.

  • Change Default Credentials: Default usernames and passwords must be changed immediately.

  • Enable Network Segmentation: Isolate IoT devices from primary networks.

  • Disable Unused Features: Turn off unnecessary services like Bluetooth, remote access, and UPnP.

  • Apply Firmware Updates: Regular patches prevent exploitation of vulnerabilities.

  • Monitor Network Traffic: Use intrusion detection systems (IDS) to detect unauthorized activity.

Additional Security Considerations

Application Security

  • Install applications only from trusted sources (Google Play Store, Apple App Store).

  • Enable app permissions management to restrict access to sensitive data.

  • Use sandboxing techniques to isolate app processes.

Virtual Private Networks (VPNs)

  • Encrypts network traffic to prevent eavesdropping and MITM attacks.

  • Recommended for public Wi-Fi security.

  • Corporate environments often enforce VPN usage for remote employees.

Mobile Device Management (MDM) and Enterprise Security

  • Used to enforce corporate security policies on mobile devices.

  • Features include:

    • Remote device monitoring and management.

    • Enforced encryption and compliance checks.

    • Geofencing restrictions for access control.

    • Selective wipe for corporate data without erasing personal files.

Final Thoughts

Securing mobile and embedded devices requires a combination of authentication methods, encryption, remote security, network protections, and policy enforcement. The CompTIA A+ exam evaluates an IT professional’s ability to implement security measures to mitigate threats and enhance mobile security.