Page 21 - Mobile Data Loss
P. 21
Understanding Mobile Data Loss Threats 15
Figure 2.4 Access to Jailbroken iOS Device over Encrypted Corporate Wi-Fi Network.
employees to access websites that may be blocked by the internal cor-
porate network. Therefore these same risks should be considered at
your facilities as well.
Users of secure Wi-Fi networks at work can also be targeted. Even
when AES-256 bit encryption, WPA/WPA2, and more are used, Wi-Fi
users can normally communicate with one another over the secure and
9
encrypted Wi-Fi. Unless PSPF (Public Secure Packet Forwarding )or
Client Isolation is used on your “secure” Wi-Fi network, a malicious
insider can identify a jailbroken iOS device and attempt to log onto it.
Most iOS devices ship from the factory with a default username of
“root” with a password of “alpine.” Unless the user changed that pass-
word when they jail broke their device (and rarely do they change the
default password), anyone on that same network can log into their jail-
broken device and gain full access! (Figure 2.4).
9 http://www.cisco.com/web/techdoc/wireless/access_points/online_help/eag/123-02.JA/1400BR/
h_ap_network-if_802-11_c.html