TAILIEUCHUNG - iOS Security May 2012

Network attacks cause organizations several hours or days of downtime and serious breaches in data confidentiality and integrity. Depending on the level of the attack and the type of information that has been compromised, the consequences of network attacks vary in degree from mildly annoying to completely debilitating, and the cost of recovery from attacks can range from hundreds to millions of dollars. When application availability is compromised by attacks, companies can easily losemillions of dollars per hour. For example, companies that run e-commerce Web sites lose revenue as customers “shop” elsewhere for their products and services; informational Web sites can lose precious advertising time; and. | iOS Security May 2012 2 Contents Page 3 Introduction Page 4 System Architecture Secure Boot Chain System Software Personalization App Code Signing Runtime Process Security Page 7 Encryption and Data Protection Hardware Security Features File Data Protection Passcodes Classes Keychain Data Protection Keybags Page 13 Network Security SSL TLS VPN Wi-Fi Bluetooth Page 15 Device Access Passcode Protection Configuration Enforcement Mobile Device Management Device Restrictions Remote Wipe Page 18 Conclusion A Commitment to Security Page 19 Glossary 3 Software Data Protection Class App Sandbox User Partition OS Partition Encrypted File System Kernel Crypto Engine Hardware and Firmware Device Key Group Key Apple Root Certificate Security architecture diagram of iOS provides a visual overview of the different technologies discussed in this document. Introduction Apple designed the iOS platform with security at its core. Keeping information secure on mobile devices is critical for any user whether they re accessing corporate and customer information or storing personal photos banking information and addresses. Because every user s information is important iOS devices are built to maintain a high level of security without compromising the user experience. iOS devices provide stringent security technology and features and yet also are easy to use. The devices are designed to make security as transparent as possible. Many security features are enabled by default so IT departments don t need to perform extensive configurations. And some key features like device encryption are not configurable so users cannot disable them by mistake. For organizations considering the security of iOS devices it is helpful to understand how the built-in security features work together to provide a secure mobile computing platform. iPhone iPad and iPod touch are designed with layers of security. Low-level hardware and firmware features protect against malware and viruses while high-level OS features

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.