Page 21 - Mobile Data Loss
P. 21

Understanding Mobile Data Loss Threats  15


































            Figure 2.4 Access to Jailbroken iOS Device over Encrypted Corporate Wi-Fi Network.

            employees to access websites that may be blocked by the internal cor-
            porate network. Therefore these same risks should be considered at
            your facilities as well.

               Users of secure Wi-Fi networks at work can also be targeted. Even
            when AES-256 bit encryption, WPA/WPA2, and more are used, Wi-Fi
            users can normally communicate with one another over the secure and
                                                                          9
            encrypted Wi-Fi. Unless PSPF (Public Secure Packet Forwarding )or
            Client Isolation is used on your “secure” Wi-Fi network, a malicious
            insider can identify a jailbroken iOS device and attempt to log onto it.
            Most iOS devices ship from the factory with a default username of
            “root” with a password of “alpine.” Unless the user changed that pass-
            word when they jail broke their device (and rarely do they change the
            default password), anyone on that same network can log into their jail-
            broken device and gain full access! (Figure 2.4).




            9 http://www.cisco.com/web/techdoc/wireless/access_points/online_help/eag/123-02.JA/1400BR/
            h_ap_network-if_802-11_c.html
   16   17   18   19   20   21   22   23   24   25   26