NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. iOS.

Slides:



Advertisements
Similar presentations
Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Advertisements

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Getting to Know Your iPad. Overview Tip: the back camera is the best!
Objectives Overview Define an operating system
IOS Security Chun Zhang. Introduction iOS devices provide stringent security technology and features. The devices are designed to make security as transparent.
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
The Natural way for Secure Mobile v.1.4
Meraki Mobile Device Management
© 2012 Microsoft Corporation. All rights reserved. Introducing SkyDrive. With Windows 8 never be without your files again. SkyDrive helps you sync, store,
HNA-Drive Familiarization Presentation. From the address bar in your preferred internet browser, navigate to Site supports: Internet.
© Copyright RES Software. v2012-Mar30. RES HyperDrive Patrik Zander, Product Manager 1.
ICLOUD TECHNOLOGY WITH SECURITY ISSUES Group 4: Tse Shun Dun Wong Ngai Shan Wong Chi Ho Cheung Chun Kan Wong Yuet Hing
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Donna Thompsson For Tech Tips - Facebook: Debbie Jarrett – Ed Tech PD
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
CS 550 Amoeba-A Distributed Operation System by Saie M Mulay.
Andrew Schroeder Networking Aspects of Cloud Computing.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
Phone Trivia McKay Fackrell PLAY. What is the current operating system for Apple? Question one iOS Apple 8 OS X Lion OS X Yosemite.
ENCRYPTION Coffee Hour for August HISTORY OF ENCRYPTION Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message.
From: FileRescure Studio
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Authentication Approaches over Internet Jia Li
New Technology Group Meeting 4 November 2013 Mike Hender.
November 10, 2010 Washington, D.C.. Agenda Secure Component tool Secure Component tool Contacts and Messaging Contacts and Messaging Workspaces Workspaces.
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
System Architecture.  Windows Phone 7  Mobile Phone Application  User – End Perspective  Google App Engine  Administration Console  Handles authentication,
Chris Nilsson n.
Mobile and Devices System iPhone OS GVHD: Dr. Trần Ngọc Minh SVTH: Phan Nhật Hoàng Nguyễn Chí Thông Hồ Diên Tuấn Anh
How computers work Learning objective 2: Explain the four basic functions of a computer.
Mobile Device Security
Explain the purpose of an operating system
Team 16 : MedFRS Device Diagnostic Software Misha DowdProject Manager Delnaz GundeviaLife Cycle Planner Anfal Abdul JaleelSystem Architect Nanda Kishore.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Student iPad Configurations
MICHAEL J MONROE. What is ? Collection of online services and software offered by Apple. Compatible with Mac OSX, Windows, iPhone, and iPod Touch. Released:
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Chapter 2 Securing Network Server and User Workstations.
SMARTPHONE FORENSICS 101 General Overview of Smartphone Investigations.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Wireless and Mobile Security
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
Basic Apple Configurator Preferences. Apple Configurator  Preferences…
FriendFinder Location-aware social networking on mobile phones.
FriendFinder Location-aware social networking on mobile phones.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
FriendFinder Location-aware social networking on mobile phones.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
AccessData User Summit 2016 April 5 th – 7 th, 2016 Lake Mary, FL iOS 9 and Android 6.
Transfer Music from iPhone to Computer From:
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
Setting Up Your New iPad. Turn on Your iPad and then… Select English Select United States Select DVUSD Mobile as your wifi network Select enable location.
Make Your iPad Work for You Session 2 Brian McCarty.
© 2015 MetricStream, Inc. All Rights Reserved. AWS server provisioning © 2015 MetricStream, Inc. All Rights Reserved. By, Srikanth K & Rohit.
Transfer Files from iPhone to Mac From:
Sync Music/Video/Picture/Contacts from iCloud to iPhone/iPad/iPod All rights reserved—
IOS 9 - What’s new in iOS. Apple’s iOS 9 is now available for download for all iPhone, iPad, and iPod touch models that can run iOS 8. According to Apple,
Understand Wireless Security LESSON Security Fundamentals.
MOBILE TECHNOLOGY BY: AMANDA HANKS. SKYDRIVE VS. DROPBOX SkyDrive: More Free Storage Space (7 GB) Less Costly for more Storage Space $10,$25,$50 Less.
Mobile Operating Systems
OS X Yosemite Troubleshooting 9L0-066 Exam Questions Pack
Cloud Computing Cloud computing: (the Internet represents the Cloud).
Directions: GO THROUGH THE FOLLWING SLIDES. Make sure you have quizlet cards for all the vocabulary. Study the terms GCFLearnFree website “Computer Basics”:
Presented by Sharper Training Solutions, Inc.
IPad 101.
Exercise: Hashing, Password security, And File Integrity
Digital Literacy 1.00 Computer Basics
To change the image on this slide, select the picture and delete it
Presentation transcript:

NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. iOS Security Teacher: Dr Tran Ngoc Minh Group members: Vo Tran Dang Khoa Le Hoa

2 Introduction Every iOS device combines software, hardware, and services designed to work together for maximum security and a transparent user experience. iOS protects not only the device and its data at rest, but the entire ecosystem, including everything users do locally, on networks, and with key Internet services. iOS and iOS devices provide stringent security features, and they’re easy to use.

3 iOS Security System security : The integrated and secure software and hardware that are the platform for iPhone, iPad, and iPod touch. Encryption and data protection : The architecture and design that protect user data if the device is lost or stolen, or if an unauthorized person attempts to use or modify it. App security : The systems that enable apps to run securely and without compromising platform integrity. Network security : Industry-standard networking protocols that provide secure authentication and encryption of data in transmission. Internet services : Apple’s network-based infrastructure for messaging, syncing, and backup. Device controls : Methods that prevent unauthorized use of the device and enable it to be remotely wiped if lost or stolen.

4 System security Secure Boot Chain System Software Authorization Secure Enclave Touch ID

5 System security Secure Boot Chain System Software Authorization Secure Enclave Touch ID

6 The 88-by-88-pixel, 500-ppi raster scan is temporarily stored in encrypted memory to generate map of nodes. Touch ID can be trained to recognize up to five different fingers. With one finger enrolled, the chance of a random match with someone else is 1 in 50,000 Touch ID can also be configured to approve purchases from Apple’s stores.

7 Encryption and data protection Hardware Security Features File Data Protection Passcodes Data Protection Classes Keychain Data Protection

8 Encryption and data protection Hardware Security Features File Data Protection Passcodes Data Protection Classes Keychain Data Protection

9 File Data Protection Every time a file on the data partition is created, Data Protection creates a new 256-bit key (the “per-file” key). The per-file key is wrapped with one of several class keys, depending on the circumstances under which the file should be accessible. After that it is stored in a file’s metadata, which is in turn encrypted with the file system key. The class key is protected with the hardware UID.

10 Internet Services iMessage FaceTime Siri iCloud iCloud Keychain

11 Internet Services iMessage FaceTime Siri iCloud iCloud Keychain

12 iMessage Two pairs of keys. The private keys are saved in the device’s keychain and the public keys are sent to Apple’s directory service (IDS). Public key to send and private key to receive messages. If the message text is too long, or if an attachment such as a photo is included, the attachment is encrypted using a random key and uploaded to iCloud.

13 Reference Apple (2/2014 ), iOS Security document. Greg Kumparak (27/2/2014), Apple Explains Exactly How Secure iMessage Really Is,. exactly-how-secure-imessage-really-is/

Thank you for your attention !!