CISSP Insecure Devices – Bk1D3T7St7

Insecure Devices is because of the limitations imposed by mobile operating systems (primarily to improve security), some users modify their devices to bypass these controls in order to install apps that can perform functions not permitted normally. This is called “jailbreaking” or “rooting” the device, and significantly reduces the inherent security of the device.

Rooted phones have many more vulnerabilities, and therefore pose an increased risk from malware which can exfiltrate data or record keypresses and thus harvest login credentials. In fact, such applications can be installed on some phones without first requiring root privileges. A variety of keylogging software exists for the market of parents with phone-wielding children and suspicious spouses.