Professional Documents
Culture Documents
Security
Model
PUAN SHAIFATUL’AIN BINTI
MOHAMAD
SECURITY MOBILE COMPUTING
Security
Mobile
Computing
Device Security Network Security
(Hidayat F2036) 01 03 (Syafiq F2056)
• Apple allows these locks to be forced on as part of an enterprise policy, or can be set
manually by individual users.
• Users can additionally set the device to automatically wipe itself if the wrong
passcode is entered too many times.
2. Data
Security
Hidayat F2036
Data Security
•Incorporated a number
of data security •Remote wipe feature
•Encryption feature •Data backed up • A password is
approaches to protect allows the device to be
causes all data on the through iTunes can also set through iTunes, and
wiped once it’s
sensitive data on the device to be encrypted. be encrypted. stored on the device.
device, with the goal of discovered stolen by the
protecting data even if owner, or if too many
passcode attempts fail.
the device is stolen.
3.Network
Security
Syafiq F2056
Network Security
Apple's sandbox limits the amount of memory and CPU cycles . Its restricts it from accessing files
from outside .
APPLICATION SECURITY