You are on page 1of 13

iOS

Security
Model
PUAN SHAIFATUL’AIN BINTI
MOHAMAD
SECURITY MOBILE COMPUTING

NAME MATRIKS NUMBER

AHMAD YUSUF FARHAN BIN AWANG 13DDT20F2008

MUHAMMAD HIDAYAT BIN AB AZIZ 13DDT20F2036

MUHAMAD SYAFIQ IKRAM BIN 13DDT20F2056


MOHAMAD TARMIZI

Security
Mobile
Computing
Device Security Network Security
(Hidayat F2036) 01 03 (Syafiq F2056)

Data Security 02 04 Application Security


(Hidayat F2036) Ahmad F2008)
1.
Device
Security
Hidayat F2036
1. Device Security

• Help ensure that a user’s device can’t be used by an unauthorized party.

• Apple allows these locks to be forced on as part of an enterprise policy, or can be set
manually by individual users.

• Enterprises can force a passcode to have a minimum length, alphanumeric


composition, complex characters, and even set the maximum age and history policies for a
passcode.

• Users can additionally set the device to automatically wipe itself if the wrong
passcode is entered too many times.
2. Data
Security

Hidayat F2036
Data Security

•Incorporated a number
of data security •Remote wipe feature
•Encryption feature •Data backed up • A password is
approaches to protect allows the device to be
causes all data on the through iTunes can also set through iTunes, and
wiped once it’s
sensitive data on the device to be encrypted. be encrypted. stored on the device.
device, with the goal of discovered stolen by the
protecting data even if owner, or if too many
passcode attempts fail.
the device is stolen.
3.Network
Security
Syafiq F2056
Network Security

Apple Include Have

Apple has incorporated These include VPN, WEP/WPA/WPA2 wireless


many of the same solutions SSL/TLS transport encryption and
used in secure networking encryption authentication.
into iOS.
4. APPLICATION
SECURITY
By
AHMAD F2008
APPLICATION SECURITY

App Store applications are run in a sandbox.

Sandboxing refers to an environment where code is deemed untrusted

Apple's sandbox limits the amount of memory and CPU cycles . Its restricts it from accessing files
from outside .
APPLICATION SECURITY

- Applications running in the sandbox cannot


access other applications or their data,

- Apple has incorporated application signing to


police the binary code allowed to run on the
device.
- In order for an application to be permitted to
run under iOS, it must be signed by Apple

- Apple also performs runtime checks to test the


integrity of an application
Thank You

You might also like