Page 164 - StudyBook.pdf
P. 164

148    Chapter 3 • Communication Security: Remote Access and Messaging

             Mobile devices that utilize the Internet connect via ISP designated frequency to
             the WAP gateways, thereby sending and retrieving secure (encoded) content.
                 A device, however secure a connection it communicates over, can still be com-
             promised via theft and loss.To this end, mobile devices now have the ability to
             receive a “forced wipe” (sometimes referred to as issuing a “kill pill”). Certain man-
             ufacturers of enterprise mobility solutions and ISPs will provide this functionality
             so that a device setup with Windows Mobile, for example, can be wiped of all of its
             personal data and documents when the device is reported missing.
                 In addition, most devices have the ability to require password access and the
             equivalent of “screensaver” locks that require the user to authenticate themselves
             either by pin or domain credentials.This extra step, though certainly a nuisance to
             users, does protect documents and communications stored on the device.
                 E-mail server access is typically a major feature of any mobile device. OSes like
             the Palm Treo OS and Windows Mobile come ready to accept the addresses and
             names of e-mail servers and will utilize the PDA’s Internet access to facilitate com-
             munication to these servers. For this reason, it is recommended to require that
             client certificates be presented to the e-mail servers by the mobile clients for con-
             nectivity.This means limiting traffic not only to SSL, but to users who can provide
             the same certification issued by the company that distributed the device.The pro-
             cess of importing of digital certificates to mobile messaging devices varies by OS.


                Mobility and Presence Aware Applications
           Head of the Class...  provides client software for Windows Mobile devices, allowing for a full
                The use of digital certificates also protects IM traffic that is now available
                on these devices. Microsoft’s Live Communication Server, for example,

                range of “presence” aware technologies. Via this client, Global Address
                List (GAL) information and electronic communication is enabled at the
                device. This software can also be required to present a digital certificate
                to the LCS authentication servers, and the recommendation is always to
                choose this path.





             E-mail and Viruses

             Viruses are often spread as e-mail attachments.Attachments might be compressed
             files (such as ZIP files), programs (such as .exe files), or documents. Once the file is
             executed, the virus is released. Executing the file can be done by opening or





          www.syngress.com
   159   160   161   162   163   164   165   166   167   168   169