Apple (information Assurance Policy) Introduction to Information Assurance MR. Mohammed Rafiq Section 201 Group Project Members: Ebtihal AlQurashi ID:200800747 Farah AL-Sharif ID:200900901 Ghada Odeh ID:200901484
Outline: Introduction Mac Security Issues Apple's Information Assurance Policy Recommendation Conclusion
Introduction: Apple corporation : American multinational corporation that designs and sells consumer electronic Established in 1st of April 1976 in California, USA By Steve Jobs, Steve Wozniak and Ronald Wayne The largest publicly traded company in the world by market capitalization 375 retail stores, plus on-line stores
Mac Security Issues Scams and fraud: User error: Mobile threats Online scams, retail and auction fraud, and identity-theft. User error: Using poor passwords, downloading risky files. Mobile threats Theft Online hazards: Viruses and risky files.
Apple's Information Assurance Policy “Your privacy is important to Apple. So we’ve developed a Privacy Policy that covers how we collect, use, disclose, transfer, and store your information”
Apple's Information Assurance Policy(Cont.) Protect your data by : iCloud Enabling Data Erase from settings
Apple's Information Assurance Policy(Cont.) I Cloud: which is built with industry-standard security practices and employs strict policies to protect the data 1. using strong passwords 2. Find my iPhone, iPad, etc..
Apple's Information Assurance Policy(Cont.) Strong passwords when creating an iCloud ID the password must: contain a minimum of 8 characters, a number, an uppercase letter, a lowercase letter, not be the same as the account name, and not be used in the last year
Apple's Information Assurance Policy(Cont.) Find my iPhone, iPad, etc.. locate where your missing device is Remotely lock your iPhone or erase data
Enabling Data Erase By setting the number of failed pass-codes that can be entered prior to all data being erased from the phone
Recommendations Hide files and folders from the curious eyes of the people who might use your .own Mac with you Send e-mail messages and attachments encrypted with a password
Recommendations (Cont.) Switch on Your Firewall Antivirus Software
conclusion Our mission is to provide leading edge products and solution offerings that deliver immediate and quantifiable value to our customers; to change the movement of information to an ongoing, automated process; and to help IT organizations fully optimize IT resources while dramatically decreasing capital and operational
References http://support.apple.com/kb/ht4865 Creating I tunes account. (n.d.). Retrieved fromhttp://support.apple.com/kb/ht2534 Mogull, R. (2010, January 5). Mac security: reality check. Retrieved fromhttp://www.macworld.com/article/1145438/macsecurityreality.html iCloud security and privacy.(2013). Retrieved March 4, 2013, from Protect your mac. (n.d.). Retrieved from http://www.getsafeonline.org/nqcontent.cfm?a_id=1165 Schramm, M. (2007, June 26). History of the apple store. Retrieved fromhttp://www.tuaw.com/2007/06/26/history-of-the-apple-store/ http://support.apple.com/kb/ht4865
THANK YOU FOR LISTENING