Security Of The Iphone 5 Computer Science Essay

Published: 2021-07-26 23:20:06
essay essay

Category: Information Technology

Type of paper: Essay

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Hey! We can write a custom essay for you.

All possible types of assignments. Written by academics

Apple has designed IOS platform with security at its core. For keeping all the user information secure , whether they are accessing customer information or personal photos , banking information and addresses. IOS devices are built to have high security levels without compromising the user experience. The IOS devices are designed to make security very transparent. Many security features are already enabled by default, and some key features, for instants device encryption , are not changeable, which means the user cannot disable them by mistake.
Ways of security technologies and features are applied within the IOS platform:
• System architecture: The secure ways and hardware foundations of iPhone.
• Encryption and Data Protection: The design which protects the user’s information when the device has been lost or stolen, or when an unlicensed person tries to use or change it.
• Network security: Industry-standards networking protocols that help secure data when it is sent.
• Device access: ways that help unofficial use of the device and enable it automatically and remotely to wipe when its lost or stolen.
The tight agreement that the hardware and software share on IOS devices allows accepting of activities across layers of the device. For third party apps, each app is analyzed to make sure that the apps are secure and trusted and uses the recourses properly.
Secure Boot Chain:
Every step of the boot-up process has information which is signed by apple ensure integrity and proceed after the verification the chain of trust, which includes bootloaders, kernel, kernel extensions, and baseband firmware. The secure boot chain makes sure that the lowest software have not been harmed and allow IOS to run only on apple devices.
System Software Personalization:
Apple releases software updates on a regular basis for security concerns; these types of updates are provided for all supported devices. The users can receive the IOS update notification on their devices through iTunes, and the updates are delivered wireless , which encourages the adoption of the newest security fixes. The IOS updates can be installed with iTunes or over the air (OTA) , with the help of iTunes, a full copy of IOS installed.
App code Singing:
To ensure that all of the apps are secure and come from an approved source, IOS expect that all codes to be approved by apple certificate. For instants Apps provided with the device, safari and mail are apps approved by Apple. Other apps must also be signed with an apple- issued certificate. Unlike other mobile companies, IOS won't allow the user to install unsigned apps from websites.
Runtime Process Security:
When an app is verified, IOS applies security measures to make sure that it can't compromise other apps or the system. All third-party apps are "sandboxed". Which prevents apps from gathering or modifying information from other apps.
• Encryption and Data Protection:
Hardware Security Features:
When using a mobile device, speed and power are very important. Some operations are difficult and can introduce performance or battery problems if not designed correctly. Every IOS device has an AES 256 engine built between the flash storage abed main system memory, making file encryption very fast. There is a SHA-1 implemented in hardware, which reduces cryptographic operation overhead.
The IOS devices include a feature to secure data erasure called enforceable storage. The feature is useful so that the user can directly erase a small number of blocks at a lower level.
File Data Protection:
The feature can be switched on and can be connected to the internet and the user can receive phone calls, email. And it also allows the device to respond to events such as phone without hurting the data and downloads can proceed while the phone is locked. Data protection is made and managed by a hierarchy key, and builds on the hardware encryption.
By setting up a password for your device you’re automatically enabled Data protection. This protection protects from an attacker access to your phone.users can choose to wipe the device automatically after ten attempts.
Network Security:
There are many security measures that organizations can take to keep a safeguard information as it travels from IOS device, mobile users can access information from anywhere from the world, so it is important to have authorization and that their data is protected during the transmission.
IOS provides technologies which can accomplish security for both WI-Fi and other network connections
Device Access:
IOS supports flexible security policies which are easily enforced and managed. This enables users to protect information.
Passcode protection:
Passcodes prevent unauthorized access to the devices. The IOS interface applies escalating time delays after the entry of an invalid passcode, users can choose to automatically wipe their devices after 10 failed passcode attempts.
By default the user passcode is usually a four-digit PIN. The user can choose to make it longer by turning on Setting >General >Passcode>complex passcode. Longer passcode is harder to guess or attack and are highly recommended for enterprise use.

Warning! This essay is not original. Get 100% unique essay within 45 seconds!


We can write your paper just for 11.99$

i want to copy...

This essay has been submitted by a student and contain not unique content

People also read