Amber is working as a team lead in an organization. She was instructed to share a policy document with all the employees working from remote locations and collect them after filling. She shared the files from her mobile device to the concerned employees through the public Internet. An unauthorized user accessed the file in transit, modified the file, and forwarded it to the remote employees.
Based on the above scenario, identify the security risk associated with mobile usage policies.
- Lost or stolen devices
- Infrastructure issues
- Improperly disposing of devices
- Sharing confidential data on an unsecured network
Answer(s): D
Explanation:
Sharing confidential data on an unsecured network is a security risk associated with mobile usage policies. Mobile devices are often used to access and transmit sensitive information over public or untrusted networks, such as WiFi hotspots, cellular networks, or Bluetooth connections. This exposes the data to interception, modification, or redirection by malicious actors who may exploit mobile security vulnerabilities or use network-based attacks, such as man-in-the-middle, spoofing, or sniffing. To prevent this risk, mobile users should follow best practices such as using encryption, VPN, certificate pinning, and secure protocols to protect the data in transit. They should also avoid sending or receiving sensitive data over unsecured networks or applications, and verify the identity and integrity of the endpoint servers before establishing a connection.
Reference:
The 9 Most Common Security Threats to Mobile Devices in 2021, Auth0, June 25, 2021 7 Mobile App Security Risks and How to Mitigate Them, Cypress Data Defense, July 10, 2020 The Latest Mobile Security Threats and How to Prevent Them, Security Intelligence, February 19, 2019.
Reveal Solution Next Question