-
Book Overview & Buying
-
Table Of Contents
Mastering Mobile Forensics
By :
This chapter cannot hold all the hardware and software security aspects of iDevices, thus we will see a general overview of how security is implemented on those devices.
All of Apple's iDevices have a combined built-in hardware/software advanced security and according to Apple's official iOS Security Guide can be categorized as follows:
System security: Integrated software and hardware platform
Encryption and data protection: Mechanisms implemented to protect data from unauthorized use
Application security: Application sandboxing
Network security: Secure data transmission
Apple Pay: Implementation of secure payments
Internet services: Apple's network of messaging, synchronizing and backing up.
Device controls: Remotely wiping a device if lost or stolen
Privacy control: Controlled access to geolocation and user data
The overview of the iOS security architecture is as follows:

The hardware implementation in Apple's devices offer a dedicated AES-256 engine built...
Change the font size
Change margin width
Change background colour