Information Technology Reference
In-Depth Information
iOS security
iOS was designed with security at its core. At the highest level, the iOS security architec-
ture appears as shown in the following figure:
The iOS security architecture
Apple iOS devices such as iPhone, iPad, and iPod Touch are designed with layers of secur-
ity. Low-level hardware features safeguard from malware attacks and the high-level OS
features prevent unauthorized use. A brief overview of the iOS security features are
provided in the following sections.
Passcode
Passcodes restrict unauthorized access to the device. Once a passcode is set, each time you
turn on or wake up the device, it will ask for the passcode to access the device. iPhone sup-
ports simple as well as complex passcodes. iPhone 5S also supports touch ID fingerprints
as a passcode.
Code signing
Code signing prevents users from downloading and installing unauthorized applications on
the device. Apple says "Code Signing is the process by which your compiled iOS applica-
tion is sealed and identified as yours. Also, iOS devices won't run an application or load a
library unless it is signed by a trusted party. To ensure that all apps come from a known and
Search WWH ::




Custom Search