Cheap for you reading-Mobile Access Safety Beyond BYOD (11)

Source: Internet
Author: User

5.4 Rowley Sir, when the return trip occurred the attack in the terminal.

Finally, when Mr. Rowley decided to sync his address book on his smartphone and laptop, he connected the two with a data cable. However, the hacker has set up a computer with Bluetooth * * * installed in the terminal. Hackers know that such a place would attract high-end people from some of the market-classified information of the holders. After analyzing the data exchanged by Rowley two devices, the hacker can calculate the encryption key and get all the data.

(Translator Note: To be honest, our country's national conditions are the major airport terminal because it is relatively tall on the place, ordinary cock silk what the general does not go into there, so "Set up a computer with Bluetooth listening in the terminal" this is seldom happening. More is "rub the net family". They usually steal through a variety of hacker software is not your trading information but your WiFi password oh. Perhaps crossing said: "It seems that my heavenly airport is still relatively safe." "In fact, it depends on how you understand, once someone else gets the WiFi password or computer login password, the computer is interested in files are also available." Having the conscience to entertain oneself, no conscience of the finger will be out of what "door" event. )

The author explains the safe working mode of Bluetooth in the following space mainly from the technical. Since our main focus is on attack and defense, in short, the hacker listens passively, obtains the following information, and then uses the brute force attack the way attacks:

- Unique Address code for the primary device that originated the connection

- Unique Address code of the slave device that accepts the connection

- random number at password Exchange

- random messages generated by the host device initiating the connection

- random messages generated from devices that accept connections

in short, if you do not want to complement the Bluetooth security protocol's own weaknesses by turning off Bluetooth on your device or by banning it in public, then at least connect the device in a relatively safe place or use as long as possible pin code. In addition, the use of proprietary encryption software to ensure that hackers passively listen to the data obtained is difficult to be cracked.

(Translator notes: To say a digression, except the company IT Department of Self-built wireless management services to the background synchronization unexpectedly, most users in the domestic synchronization of handheld devices and computer mail client address Book is usually used for free or inexpensive various cloud services. Although this is convenient and real-time, but frankly now the cloud disk Service provider's technology and security configuration is mixed, so it is recommended that you use the big brand of cloud services, at least relatively stable and reliable some. )

5.5 Confidential data leaks caused by loss of smartphone

once Mr. Rowley's smartphone was stolen and the lock screen pin was missing, and the data on it would be at risk of being stolen.

Therefore, the first line of defense to protect your smartphone is to enable the lock screen function, such as a digital password or a letter password. This provides the simplest protection, but it is enough for simple curiosity or a thief without IT skills.

Enabling the App Data encryption feature is also a line of defense. Finally, there are remote erase scenarios to deal directly with the stolen situation.

(Translator Note: The lock screen is now more popular is the lock screen pattern.) It's also a standard for visually using an Apple smartphone or an Android phone, and I can see that the thief is certainly more refined than we are.

especially for Apple smartphones, we should all know that there is a Find My iphone feature, which can be used to locate, lock or erase the iphone, and send the last location after it has been stolen. Unfortunately, the domestic landing icould website is very slow, basic is a decoration.

In addition, the domestic development of apps rarely have the ability to encrypt communication data. This can not completely blame developers, although repeatedly speed up, but after all, the domestic wireless network bandwidth to be mentioned, if added decryption function will directly slow down the user experience degree. )

the more comprehensive approach is to Mr. Rowley's smartphone incorporates the management of the MDM scheme to automate the implementation of the security policies adopted by the company for all mobile devices connected to the information system.

(Translator notes: MDM includes Mam are the closest to the hot topic, we are interested to refer to my post: http://bbs.51cto.com/thread-1135869-1.html)


Cheap for you reading-Mobile Access Safety Beyond BYOD (11)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.