2 cissp ® Official Study Guide Eighth Edition


Chapter 11  ■ Secure Network Architecture and Securing Network Components Cordless Phones



Download 19,3 Mb.
Pdf ko'rish
bet476/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   472   473   474   475   476   477   478   479   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

508
Chapter 11 

Secure Network Architecture and Securing Network Components
Cordless Phones 
Cordless phones represent an often-overlooked security issue. Cordless phones are designed 
to use any one of the unlicensed frequencies, in other words, 900 MHz, 2.4 GHz, or 
5 GHz. These three unlicensed frequency ranges are employed by many different types of 
devices, from cordless phones and baby monitors to Bluetooth and wireless networking 
devices. The issue that is often overlooked is that someone could easily eavesdrop on a con-
versation on a cordless phone since its signal is rarely encrypted. With a frequency scanner, 
anyone can listen in on your conversations.
Mobile Devices 
Smartphones and other mobile devices present an ever-increasing security risk as they 
become more and more capable of interacting with the internet as well as corporate net-
works. Mobile devices often support memory cards and can be used to smuggle malicious 
code into or confi dential data out of organizations. Many mobile devices also support USB 
connections to perform synchronization of communications and contacts with desktop 
and/or notebook computers as well as the transfer of fi les, documents, music, video, and 
so on. The devices themselves often contain sensitive data such as contacts, text messages, 
email, and even notes and documents. 
The loss or theft of a mobile device could mean the compromise of personal and/or cor-
porate secrets. 
Mobile devices are also becoming the target of hackers and malicious code. It’s impor-
tant to keep nonessential information off portable devices, run a fi rewall and antivirus 
product (if available), and keep the system locked and/or encrypted (if possible). 
Many mobile devices also support USB connections to perform synchronization of com-
munications and contacts with desktop and/or notebook computers as well as the transfer 
of fi les, documents, music, video, and so on. 
Additionally, mobile devices aren’t immune to eavesdropping. With the right type of 
sophisticated equipment, most mobile phone conversations can be tapped into—not to 
mention the fact that anyone within 15 feet can hear you talking. Employees should be 
coached to be discreet about what they discuss over mobile phones in public spaces. 
A wide range of security features is available on mobile devices. However, support for 
a feature isn’t the same thing as having a feature properly confi gured and enabled. A secu-
rity benefi t is gained only when the security function is in force. Be sure to check that all 
desired security features are operating as expected on any device allowed to connect to the 
organization’s network. 
A device owned by an individual can be referenced using any of these 
terms: portable device, mobile device,
personal mobile device (PMD)

personal electronic device
or
portable electronic device (PED)
, and 
personally owned device (POD)
.


Cabling, Wireless, Topology, Communications, and Transmission Media Technology 
509
For more information on managing the security of mobile devices, please see Chapter 9, 
“Security Vulnerabilities, Threats, and Countermeasures,” specifically the section “Assess 
and Mitigate Vulnerabilities in Mobile Systems.”

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   472   473   474   475   476   477   478   479   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish