Cell Phone and PDA Security: NIST SP800-124 by M. E. Kabay, PhD, CISSP-ISSMP Associate Professor of Information Assurance School of Business & Management Norwich University, Northfield VT Cell phones and personal digital assistants (PDAs) have fused. Take the Nokia N810< http://www.nokiausa.com/link?cid=PLAIN_TEXT_607318# > as an example: it has a full keyboard, a high-resolution (800 x 480 pixel, 64K colors) screen, 400 MHz processor running Linux. They include applications for e-mail, calendar, music, Web browsing, maps, and imagehandling. Their networking capabilities include IEEE 802.11b/g, Bluetooth, and USB connectivity. According to PC World’s Jr Raphael, researchers at the Georgia Tech Information Security Center< http://www.gtisc.gatech.edu/ > warned in October 2008< http://www.gtiscsecuritysummit.com/pdf/CyberThreatsReport2009.pdf > that “As Internet telephony and mobile computing handle more and more data, they will become more frequent targets of cyber crime.” Computer scientists Wayne Jansen< http://csrc.nist.gov/staff/rolodex/jansen_wayne.html > and Karen Scarfone < http://csrc.nist.gov/staff/rolodex/scarfone_karen.html > of the Computer Security Division < http://csrc.nist.gov/ > of the Information Technology Laboratory (ITL)< http://www.itl.nist.gov/ > at the National Institute of Standards and Technology (NIST)< http://nist.gov/ > have written a new (October 2008) Special Publication (SP) entitled “Guidelines on Cell Phone and PDA Security” (NIST SP800-124)< http://csrc.nist.gov/publications/nistpubs/800-124/SP800-124.pdf > which summarizes the security issues and provides recommendations for protecting sensitive information carried on these devices. http://csrc.nist.gov/publications/nistpubs/800-124/SP800-124.pdf The Executive Summary presents a succinct overview including a list of vulnerabilities leading to risks for corporate security from cell phones and PDAs: The devices are easily lost or stolen and few have effective access controls or encryption; They’re susceptible to infection by malware; They can receive spam; Wireless communications can be intercepted, remote activation of microphones can eavesdrop on meetings, and spyware can channel confidential information out of the organization; Location-tracking systems allow for inference; E-mail kept on servers as a convenience for cell-phone/PDA users may be vulnerable to server vulnerabilities. The key recommendations, which are discussed at length in this 51-page document, include the following (quoting from the list on page ES-2 through ES-4): 1. Organizations should plan and address the security aspects of organization-issued cell phones and PDAs. Organizations should employ appropriate security management practices and controls over handheld devices. a. Organization-wide security policy for mobile handheld devices b. Risk assessment and management c. Security awareness and training d. Configuration control and management e. Certification and accreditation. 3. Organizations should ensure that handheld devices are deployed, configured, and managed to meet the organizations’ security requirements and objectives. a. Apply available critical patches and upgrades to the operating system b. Eliminate or disable unnecessary services and applications c. Install and configure additional applications that are needed d. Configure user authentication and access controls e. Configure resource controls f. Install and configure additional security controls that are required, including content encryption, remote content erasure, firewall, antivirus, intrusion detection, antispam, and virtual private network (VPN) software g. Perform security testing. 4. Organizations should ensure an ongoing process of maintaining the security of handheld devices throughout their lifecycle. a. Instruct users about procedures to follow and precautions to take, including the following items: Maintaining physical control of the device Reducing exposure of sensitive data Backing up data frequently Employing user authentication, content encryption, and other available security facilities Enabling non-cellular wireless interfaces only when needed Recognizing and avoiding actions that are questionable Reporting and deactivating compromised devices Minimizing functionality Employing additional software to prevent and detect attacks. Enable, obtain, and analyze device log files for compliance b. Establish and follow procedures for recovering from compromise c. Test and apply critical patches and updates in a timely manner d. Evaluate device security periodically. 2. After reading this document, it is clear to me that organizations should consider the benefits of issuing centrally-selected and –controlled devices to their employees rather than allowing employees to download potentially sensitive information to a wide variety of uncontrolled mobile targets for industrial espionage. NIST SP800-124 will provide a useful framework for discussions and planning of reasonable security programs to prevent serious losses from unsecured cell phones and PDAs. *** M. E. Kabay, PhD, CISSP-ISSMP < mailto:mekabay@gmail.com > specializes in security and operations management consulting services. CV online.< http://www.mekabay.com/cv/ > Copyright 2009 M. E. Kabay. All rights reserved. Permission is hereby granted to Network World to distribute this article at will, to post it without limit on any Web site, and to republish it in any way they see fit.