Mobile Considerations in Network Security Architecture

M
  1. TCP Congestion Control
  2. Installing Wireshark on Mac OS X (Yosemite)
  3. What are Rogue Access Points?
  4. Two Common Router Security Threats
  5. Modern Application Frameworks, Legacy Browsers and Security Implications
  6. What are Covert Channels?
  7. Mobile Considerations in Network Security Architecture
  8. Common Bluetooth Vulnerabilities to be Aware of
  9. Mitigating DoS or Distributed DoS (DDoS) attacks
  10. DNS Rebinding and Intrusion Detection with Contextual Signatures

The use of mobile devices including policies and employee restrictions should be considered in any modern network security architecture. Mobile devices are used commonly both at home and at work with some organizations managing BYOD (Bring your Own Device) policies. It is therefore important to consider the implications of this and to ensure any BYOD device is properly locked down, authorized and managed within the corporate network. Westervelt (2010) published an article several years ago on the high amount of vulnerabilities discovered within mobile devices. Many of which were reminiscent of earlier / legacy web application issues. Homeland Security Newswire published an article on the ‘new’ cybersecurity threat of smartphone apps that do more than they say they do in terms of hidden malware and other threats. n.d. (2010).

Modern network security architecture should take into consideration the threats posed by not only issued and BYOD devices, but also unauthorized hardware connected to the network. Vulnerability assessments and penetration testing should accommodate mobile devices and stricter policies put in place. Scope of penetration testing can include physical and communications exploits as well as system exploits.  Bosworth (2009). Mobile hardware causes the overall scope of security policy to be affected when compared to just looking for traditional technology hardware and software. Organizations need to continually adapt and review their evolving network security architecture to ensure they continue to mitigate threats from the ever-changing world of mobile devices.

References:

About the author

Ian Carnaghan

I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.

About Author

Ian Carnaghan

I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.

Follow Me