Module 5 - End Point Devices & Mobile Phone Security
Module 5 - End Point Devices & Mobile Phone Security
Module 5
• Avoid Jailbreaking or Rooting: Avoid modifying the phone's operating system beyond
the manufacturer's intended use, as it can expose the device to more risks.
• Two-Factor Authentication (2FA): Enable 2FA whenever possible to add an extra layer
of security to your accounts.
• Location Services: Review and manage location services settings for apps, enabling
them only when necessary to preserve privacy.
Password policy:
A password policy sets the rules that passwords for a service must meet, such as length and
type of characters allowed/disallowed, how passwords should be created, used, managed, etc.
Password policies are crucial for ensuring the security of digital accounts and systems.
• Password Length: A minimum number of characters (often 8-12) helps to create
stronger passwords.
• Complexity Requirements: A mix of character types (uppercase & lowercase alphabets,
numbers, special characters) makes passwords harder to crack.
• Regular Changes: Periodic password changes (every 60-90 days) reduces the risk of
prolonged exposure to potential breaches.
• Prohibiting Common Passwords: Blocking commonly used or easily guessable
passwords enhances security (Ex: 12345, 00000, using names in the password, etc).
• Account Lockout: Implementing a mechanism that locks the account after multiple
failed login attempts prevents brute force attacks.
• Multi-Factor Authentication (MFA): The use of MFA adds an extra layer of security,
requiring users to provide more than one form of verification.
• Education and Training: Providing guidance to users on creating strong passwords and
the importance of safeguarding them through regular training or resources.
• Restrictions on Password Sharing: Prohibiting the sharing of passwords helps maintain
individual account security.
• Password Managers: Promote the use of password manager tools to generate, store, and
manage complex passwords securely.
• Encryption and Storage: Safely storing passwords using encryption and secure hashing
methods mitigates the risk of exposing them in case of a data breach.
• Testing: Before installing patches to your system, test them in a controlled environment
(like a test network or system) to ensure they work as intended and don’t create conflicts
with existing software.
• Deployment: Once patches are tested & validated, deploy them to the production
environment.
• Verification: Confirm that the patches have been successfully applied and that systems
are functioning properly after the update.
• Monitoring and Maintenance: Regularly monitor for new vulnerabilities and keep track
of installed patches. Perform periodic checks to ensure all systems are up to date with
the latest security patches.
• Documentation: Maintain records of applied patches, dates, and any issues encountered
during the patching process. Documentation is essential for audits and future reference.
Data backup:
Data backup is all about creating duplicate copies of your files or data to protect against data
loss in case of hardware failures, human error, cyberattacks, or any unforeseen disasters.
• Regular backups: Set up a routine schedule for backing up your data depending on the
importance of the data and how frequently it changes.
• Multiple locations: Store your backups in multiple locations such as external hard
drives, cloud storage, or even offsite locations, which reduces the risk of losing all data
in case of a localized issue.
• Automate backups: Use backup tools that allow you to automate the process. This
ensures consistency and helps prevent forgetting to back up important data.
• Verify backups: Periodically check your backups to ensure they are complete and
accurate. Sometimes, backups may contain errors or become corrupted.
• Use encryption: If your data contains sensitive information, consider encrypting your
backups. This adds an extra layer of security, especially when storing data in the cloud
or on portable devices.
• Test restoration: Regularly test the restoration process to ensure your backups are
usable. It’s crucial to know that you can recover data effectively when needed.
• Prioritize important data: Prioritize what needs to be backed up more frequently or with
higher security measures. Not all the data will be equally important.
• Monitoring and Alerts: Implement monitoring tools to receive alerts for backup failures
or anomalies.
• Read Permissions: When installing, be cautious about the permissions the software is
requesting for.
• Security Software: Have reliable antivirus/anti-malware software installed and keep it
up-to-date. Run scans on downloaded files to ensure they're safe.
• Regular Updates: Keep all the third-party applications updated in order to patch security
vulnerabilities.
• Uninstall Unused Software: Remove any software that is no longer needed in order to
reduce the potential vulnerabilities on your system.
• License Agreement: Read the license agreement to understand the terms and conditions
of using the software.
• Back Up Data: Regularly back up your data to mitigate the impact of any potential
issues caused by third-party software.
Antivirus Software:
• Antivirus software is designed to detect, prevent, and remove malicious software
(malware) from a computer or device.
• Its major significance/functions are:
o Malware Protection: It scans files, emails, downloads, and other elements of
your system for known patterns and behaviours associated with viruses, worms,
Trojans, spyware, ransomware, and other types of malicious software.
Wi-Fi security
Wi-Fi security is crucial in safeguarding your network from unauthorized access, data breaches,
and various cyber threats.
Here are some essential tips to enhance Wi-Fi security:
• Strong Passwords: Use a complex, unique password for your Wi-Fi network. Avoid
using default passwords provided by the router manufacturer.
• Encryption: Enable WPA3 (Wi-Fi Protected Access 3) encryption if available on your
router. WPA2 is also secure but might not be as robust as WPA3.
• WEP (Wired Equivalent Privacy): WEP was one of the earliest Wi-Fi security protocols.
However, it is now considered insecure and easily susceptible to attacks.
• WPA (Wi-Fi Protected Access): WPA was introduced as an improvement over WEP. It
introduced dynamic encryption keys, making it more secure than WEP.
• WPA2 (Wi-Fi Protected Access 2): WPA2 is a significant improvement over WPA. It
uses the AES (Advanced Encryption Standard) encryption algorithm and provides
stronger security features. WPA2 has been widely adopted and is considered secure for
most home and small business networks.
• WPA3 (Wi-Fi Protected Access 3): WPA3 is the latest and most secure Wi-Fi security
protocol. It addresses weaknesses found in WPA2 and introduces additional security
features, including stronger encryption, protection against offline dictionary attacks,
and enhanced security for open networks.
• Network Name (SSID) Hiding: Hiding the network name or Service Set Identifier
(SSID) will make it less visible to potential attackers. While this won’t fully protect
your network, it can add a layer of obscurity.
• Router Firmware Updates: Regularly update your router's firmware to patch any
security vulnerabilities and ensure it has the latest security features.
• Firewall: Activate the firewall on your router to control incoming and outgoing traffic.
This helps prevent unauthorized access.
• Use a VPN: When connected to public Wi-Fi networks, use a Virtual Private Network
(VPN) to encrypt your internet traffic and protect your data from potential
eavesdropping.
• Define Security Policies: Create a set of rules and guidelines to protect the identified
assets.
• Access Control Policies: Define who can access what. Use principles like least privilege
(giving users only the necessary permissions) and separation of duties.
• Data Encryption Policies: Specify when and where encryption should be applied to
sensitive data, both at rest and in transit.
• Password Policies: Establish guidelines for strong, regularly updated passwords and
multi-factor authentication.
• Security Update Policies: Define how often systems and software should be updated to
patch vulnerabilities.
• Incident Response Policies: Lay out procedures for responding to security incidents,
including reporting and mitigation steps.