[ISN] ITL Bulletin for January 2009

From: InfoSec News <alerts_at_private>
Date: Fri, 30 Jan 2009 04:04:53 -0600 (CST)
Forwarded from: Elizabeth Lennon <elizabeth.lennon (at) nist.gov>

ITL BULLETIN FOR JANUARY 2009

SECURITY OF CELL PHONES AND PDAS
 
Shirley Radack, Editor
Computer Security Division
Information Technology Laboratory
National Institute of Standards and Technology
U.S. Department of Commerce

 
Our nation's workforce is highly mobile today, and very dependent on 
cell phones and personal digital assistants (PDAs) to carry out 
work-related functions while on the move. Cell phones and PDAs are 
small, relatively inexpensive, and convenient tools for many operations: 
voice calls, simple text messages, personal information management 
(PIM), such as phonebook, calendar, and notepad, and other functions 
that might normally be done at a desktop computer. It is possible to 
send and receive electronic mail, browse the Web, store and modify 
documents, deliver presentations, and access data remotely. Mobile 
handheld devices can carry out other useful functions if they are 
equipped with specialized built-in hardware, such as cameras, Global 
Positioning System (GPS) receivers, and reduced-size removable-media 
card slots. These devices use a variety of wireless interfaces, 
including infrared, Wireless Fidelity (Wi-Fi), Bluetooth, and several 
types of cellular interfaces.

The Information Technology Laboratory of the National Institute of 
Standards and Technology (NIST) recently issued a new publication that 
focuses on the security of cell phones and PDAs. The guide provides 
updated information to organizations about the issues they should 
consider in protecting the wireless handheld devices that their workers 
find indispensible.

 

NIST Special Publication (SP) 800-124, Guidelines on Cell Phone and PDA 
Security: Recommendations of the National Institute of Standards and 
Technology

NIST SP 800-124, Guidelines on Cell Phone and PDA Security, written by 
Wayne Jansen and Karen Scarfone of NIST, was issued in October 2008. The 
security of cell phones and PDAs had previously been discussed in NIST 
SP 800-48, Wireless Network Security, 802.11, Bluetooth, and Handheld 
Devices, which also covered security issues in wireless local area 
networks (WLANs) based on Institute of Electrical and Electronics 
Engineers (IEEE) 802.11 standards, and in networks based on Bluetooth 
specifications.  Bluetooth, which was developed by an industry 
consortium, is often used by cell phones, and provides three basic 
security services: authenticating the identity of communicating devices, 
protecting the confidentiality of information, and controlling access to 
resources by authorized devices.

The new guidelines discuss the technical and physical characteristics of 
cell phones and PDAs, the operating systems and network communications 
standards that they employ, and the applications that they support. A 
section of the publication describes the security threats to cell phones 
and PDAs. Another section of the guide deals with the safeguards that 
organizations can apply to reduce the risks.

NIST SP 800-124 contains an extensive list of references to both 
in-print and online sources of information about cell phone and PDA 
security. The appendices include a glossary of the technical terms 
employed in the publication and an acronym list. NIST SP 800-124 is 
available from the NIST Web site:

http://csrc.nist.gov/publications/PubsSPs.html.


Cell Phones and PDAs: Capabilities and Operations

Cell phones are compact and highly mobile devices that contain a 
microprocessor, memory components, a radio module, a digital signal 
processor, and a microphone and speaker for voice communications. Many 
cell phones support a variety of applications including telephone calls, 
text messaging, a phone book, and calendar; newer devices often have the 
ability to synchronize data with a desktop computer, to connect to the 
Internet, and to access Web sites. They may also have enhanced 
capabilities such as a camera, applications for reviewing electronic 
documents, an expanded keyboard, and protocols for the exchange of 
graphics and audio data.

Different operating systems (OSs) and communications protocols are used 
for cell phone operations. Cell phone manufacturers may support several 
different OS platforms, including proprietary systems. Smart phones 
usually use one of the following: Palm OS, Windows Mobile (phone 
edition), Research in Motion (RIM) OS, Symbian OS, iPhone OS, and Linux. 
These advanced systems feature multitasking functions and support Java 
applications.

Cell phones communicate over cellular networks that divide a large 
geographical service area into smaller areas of coverage. Different 
standards are used in digital cellular networks in the United States, 
including Code Division Multiple Access (CDMA), Global System for Mobile 
(GSM) communications networks, Time Division Multiple Access (TDMA), and 
Integrated Digital Enhanced Network (iDEN). iDEN networks use a 
proprietary protocol designed by Motorola, while the others follow 
standardized open protocols. A digital version of the original analog 
standard for cellular telephone phone service, called Digital Advanced 
Mobile Phone Service (D-AMPS), is used also. These different 
communications approaches are not compatible with each other.

PDAs are compact, mobile, battery-powered devices that are similar to 
handheld personal computers, but that store data in solid-state memory 
rather than on a hard disk. PDAs can synchronize data with a desktop 
computer, and reconcile and replicate data between the two devices. They 
contain a microprocessor, memory units, hardware keys and interfaces, 
and a touch-sensitive display screen. The latest PDAs contain slots that 
support memory cards and peripherals, such as a digital camera or 
wireless communications capabilities. Wireless communications, such as 
Infrared Data Association (IrDA), Bluetooth, and Wi-Fi, may also be 
built into the device.

The operating system (OS) of the PDA is held in Read Only Memory (ROM), 
including Flash ROM, which can be erased and reprogrammed electronically 
with OS updates or a different OS. Flash ROM may also be used to store 
critical user data and applications. Random Access Memory (RAM), which 
normally contains user data, is kept active by batteries which can fail, 
causing all information to be lost. Devices may provide additional 
functionality through expansion capabilities such as input/output (I/O) 
and memory card slots, device expansion sleeves, and external hardware 
interfaces.

Two widely used families of PDA devices are Microsoft Windows Mobile 
(formerly Pocket PC) and Palm OS. Some Linux-based PDAs are also 
manufactured. All devices support a set of basic PIM applications, 
including contact information, calendar, email, and task management. 
Most PDAs can be used to communicate wirelessly, review electronic 
documents, and access Web sites. Third-party applications can be 
developed and installed using an available Software Development Kit 
(SDK) or Integrated Development Environment (IDE).

 

General Development Trends

Handheld devices have added features and functionality over the past few 
years. The screens of cell phones have been improved, and cameras are 
often built in. Available services include text messaging, chat 
messaging, multimedia messaging, instant messaging, and electronic mail. 
Continued development of handheld devices is expected to lead to 
capabilities for more powerful and higher-speed communications, similar 
to the power and functionality of a full desktop computer. These 
improvements will help to increase productivity, turning cell phones 
into extensive data reservoirs capable of holding a broad range of 
personal and organizational information.

Noncellular PDAs are becoming less popular as smart phones now provide 
the functionality of PDAs and deliver services at high communications 
speeds. Cell phones can access the Internet, allowing users to browse 
Web sites, send electronic mail, and engage in peer-to-peer services. 
Cell phones and PDA devices with built-in Wi-Fi communications may be 
able to use a nearby access point for Voice over Internet Protocol 
(VoIP) telephony, as either a backup to cellular service or a primary 
means of communication. Future communications are expected to be 
increasingly Internet-based and multimedia-oriented.

Current models of phones can be precisely located through the Global 
Positioning System (GPS), Assisted-GPS (A-GPS), or other technologies 
for improving responses to 911 calls. This capability enables the 
delivery of information about location-based services to subscribers. 
Other long-term developments may involve the use of phones to hold 
credit card or other financial information needed for conducting 
electronic transactions, to authenticate the phone user for remote 
access to systems, and to provide information to the user about nearby 
buildings and historic sites.
 

Security Concerns

The widespread use of handheld devices creates new security risks for an 
organization. The devices and their memory cards may hold sensitive 
organizational and personal information, including information about 
product announcements, financial statements, or litigation issues. 
Information such as calendar and phonebook entries, passwords for online 
accounts, electronic documents, and audio and video media are also 
potential items of interest to an attacker. The remote resources 
accessed by a device through its wireless or wired communications 
capabilities may also be at risk, including cell phone services, voice 
mail and email repositories, and applications and data on corporate 
networks.

Attackers can achieve physical control of a device by overcoming the 
security mechanisms and gaining access to the contents of the device. 
Wireless interfaces such as cellular and Bluetooth provide additional 
avenues of exploitation. Financial losses can occur when subscription 
services that charge based on usage, such as number of text messages, 
toll numbers, and unit transmission charges, are used fraudulently. 
Attackers can use the devices to deliver malware through subscription 
services as well as through non-subscription wireless interfaces such as 
Bluetooth.

 

Security threats to mobile handheld devices include the following:

Loss or theft of cell phones and PDAs are issues because they are small 
and are often used outside the office. Handheld devices are easier to 
misplace or to be stolen than are laptop or notebook computers. With 
physical control, it is relatively easy for attackers to gain access to 
the information that the handheld devices store or are able to access 
remotely.

Unauthorized access to devices and their contents may be achieved by 
forging or guessing authentication credentials, such as a PIN or 
password, or bypassing the authentication mechanism entirely. Users 
often do not employ the security mechanisms built into a device, or they 
may apply settings that can be easily determined or bypassed.

Communications networks, desktop synchronization, and tainted storage 
media can be used to deliver malware to handheld devices. Malware is 
often disguised as a game, device patch, utility, or other useful 
third-party application available for download. Once installed, malware 
can initiate a wide range of attacks and spread itself onto other 
devices.

Similar to desktop computers, cell phones and PDAs are subject to spam, 
including text messages and voice mail, in addition to electronic mail. 
Besides the inconvenience of deleting spam, charges may apply for the 
unauthorized inbound activity. Spam can also be used for phishing 
attempts.

Electronic eavesdropping on phone calls, messages, and other wirelessly 
transmitted information is possible through various techniques. 
Installing spy software on a device to collect and forward data 
elsewhere, including conversations captured via a built-in microphone, 
is perhaps the most direct means, but other components of a 
communications network, including the airwaves, are possible avenues for 
exploitation.

Electronic tracking services allow the location of registered cell 
phones to be known and monitored. This tracking can be done openly for 
legitimate purposes, but it may also take place surreptitiously.

It is possible to create a clone of certain phones that can masquerade 
as the original.  Used in the past with analog phones, cloning is not as 
prevalent today with the rise of digital networks, but some early 
generation digital equipment has been shown to be vulnerable to cloning.

Server-resident content, such as electronic mail maintained for a user 
by a network carrier as a convenience, may expose sensitive information 
through vulnerabilities that exist at the server.

To date, incidents from malware and other identified threats involving 
handheld devices have been limited when compared with those involving 
desktop computers. One factor is that there is no single dominant 
operating system for handheld devices, fragmenting the number of 
potential homogeneous targets. Cellular network carriers have also 
favored a closed system approach in which they exerted control over 
devices and applications, as well as their networks. Nevertheless, an 
increasing amount of mobile malware has been reported over the past 
several years, which raises concerns for the future, especially when a 
more open system environment for cellular handheld devices is being 
established. An open environment would facilitate application 
development and allow flexibility in choosing devices and applications 
from many sources, but it would also expedite malware development and 
potentially provide more attractive targets to attack.

 

NIST Recommendations for Improving the Security of Cell Phones and PDAs

Many organizations and users have found that wireless communications 
devices are convenient, flexible, and easy to use. The security issues 
for these devices are significant, and many common safeguards available 
for desktop and networked computers are generally not readily available 
for handheld devices. Devices issued by the organization to staff 
members may be easier to administer than personally owned devices since 
the characteristics of the organization's devices are known, their 
configuration can be centrally managed, and controls can be installed to 
improve security and compel compliance with policy.

 
NIST recommends that organizations apply the following safeguards to 
protect their handheld devices:


Plan for and address the security aspects of organization-issued cell 
phones and PDAs.

Security issues are much more difficult to address when the deployment 
and implementation phases of systems are under way; security should be 
considered at the early stages of planning. While many of the security 
issues in protecting cell phones and PDAs are similar to protecting 
desktop computers, there are also significant differences. Handheld 
devices are generally treated more as fixed appliances with a limited 
set of functions than as general-purpose desktop systems with the 
capability for expansion. Operating system upgrades and patches are 
applied far less frequently than with desktop computers; changes to 
firmware can be more daunting to carry out and may have more serious 
consequences, such as irreversibility and inoperability. Augmenting a 
device with defenses against malware and other forms of attack is an 
important consideration in planning; another consideration is the 
centralization of security management for mobile devices.

Organizations are more likely to make decisions about configuring mobile 
handheld devices securely and consistently when they develop and follow 
a well-designed plan for implementation. Developing such a plan helps to 
identify critical issues and guides administrators in making trade-off 
decisions between usability, performance, and risk.  Existing system 
contingency, continuity of operations, and disaster recovery plans 
should also be extended to include the mobile handheld devices that have 
been issued by the organization.

Employ appropriate security management practices and controls over 
handheld devices.

Appropriate management practices are essential to operating and 
maintaining a secure infrastructure that incorporates cell phones and 
PDAs. Security practices entail the identification of an organization's 
information system assets and the development, documentation, and 
implementation of policies, standards, procedures, and guidelines that 
help to ensure the confidentiality, integrity, and availability of 
information system resources. The following steps will help to ensure 
the security of the infrastructure:

* Develop an organization-wide security policy for mobile handheld 
  devices.

* Analyze risks to identify vulnerabilities and threats, and assess 
  their likelihood of success and potential damage. Then take steps to 
  manage assessed risks by reducing them to an acceptable level and 
  maintaining that level of risk.

* Conduct security awareness and training activities to assure that 
  staff members are familiar with security policies and procedures.

* Configuration control and management should be applied to ensure that 
  systems are protected against the introduction of improper 
  modifications before, during, and after system deployment.

* Certify and accredit systems. Security certification of an information 
  technology system involves an analysis of the system to determine how 
  well it meets all of the organization's nontechnical and technical 
  security requirements. The accreditation process involves management 
  acceptance that the system meets the organization's security 
  requirements.

 
Ensure that handheld devices are deployed, configured, and managed to 
meet the organization's security requirements and objectives.

Many security issues can be avoided if the devices are configured 
appropriately. Organizations should employ only the required 
capabilities and services on mobile devices and should eliminate known 
vulnerabilities through the application of patches, upgrades, and 
additional safeguards. The default system and application settings on a 
device may emphasize features, functions, and ease of use, at the 
expense of security.  Administrators should configure devices in 
accordance with their organization's security requirements and 
reconfigure the devices as those requirements change. Security 
configuration guides or checklists can assist administrators in securing 
systems consistently and efficiently. The following steps will bolster 
the security of cell phones and PDAs:


* Apply available critical patches and upgrades to the operating system.

 
* Eliminate or disable unnecessary services and applications.

 
* Install and configure additional applications that are needed.


* Configure user authentication and access controls.

 
* Configure resource controls.

 
* Install and configure additional security controls that are required, 
  including content encryption, remote content erasure, firewall, 
  antivirus, intrusion detection, antispam, and virtual private network 
  (VPN) software.


* Perform security testing.


* Conduct an ongoing process to maintain the security of handheld 
  devices throughout their life cycle.


Maintaining handheld device security requires constant effort, 
sufficient resources, and vigilance from an organization. To maintain 
the security of a handheld device, organizations should:

* Instruct users about procedures to follow and precautions to take, 
  including the following items:

 

Maintaining physical control of the device;

Reducing exposure of sensitive data;

Backing up data frequently;

Employing user authentication, content encryption, and other available 
security facilities;

Enabling noncellular wireless interfaces only when needed;

Recognizing and avoiding actions that are questionable;

Reporting and deactivating compromised devices;

Minimizing functionality; and

Employing additional software to prevent and detect attacks.

* Enable, obtain, and analyze device log files for compliance.

* Establish and follow procedures for recovering from compromise.

* Test and apply critical patches and updates in a timely manner.

* Evaluate device security periodically.

Centralized security management of organization-issued devices 
simplifies the configuration control and management processes needed to 
ensure compliance with the organization's security policy. A number of 
products provide centralized security management and oversight of cell 
phones and PDAs through the network infrastructure.  The depth and 
breadth of capabilities that can be controlled vary among products. The 
following items are some common examples:

 

      Device registration;

      Installation of client software, policy rules, and control settings;

      Controls over password length and composition, number of entry attempts, etc.;

      Remote password reset;

      Remote erasure or locking of the device;

      Controls to restrict application downloads, access, and use;

      Controls over infrared, Bluetooth, Wi-Fi, and other means of communication;

      Controls to restrict camera, microphone, and removable media use;

      Controls over device content and removable media encryption;

Controls over VPN, firewall, antivirus, intrusion detection, and antispam components;

      Remote update of client software, policy rules, and control settings;

      Remote diagnostics and auditing;

      Device compliance status reporting; and

      Denial of services to noncompliant or unregistered devices.

 

More Information

For information about NIST standards and guidelines, as well as other 
security-related publications that help organizations protect their cell 
phones and PDAs, see NIST's Web page: 
http://csrc.nist.gov/publications/index.html.


Disclaimer

Any mention of commercial products or reference to commercial 
organizations is for information only; it does not imply recommendation 
or endorsement by NIST, nor does it imply that the products mentioned 
are necessarily the best available for the purpose.

 
_______________________________________________      
Best Selling Security Books &amp; More!
http://www.shopinfosecnews.org/
Received on Fri Jan 30 2009 - 02:04:53 PST

This archive was generated by hypermail 2.2.0 : Fri Jan 30 2009 - 02:15:02 PST