Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

iPhone Summary

As a growing part of the market, iPhones are going to be under greater scrutiny by attackers for vulnerabilities, particularly as more and more people put more and more personal parts of their lives onto these devices.

For now, attacks have been limited to jailbroken devices left with default passwords. However, we should learn lessons from these experiences because, at some future point, a vulnerability may be found in a default application, or even a third-party application sanctioned by Apple, that may provide an attacker with a path to the rest of the system.

The closed nature of the iPhone is a double-edged sword for security. Being that it is closed and applications vetted before being offered through the App Store, Apple can limit the amount of access applications have and hopefully limit exposure to malware. This comes at a cost to the user, though. Because it is closed, the user is limited in what sort of proactive steps can be taken to fend off attacks. Currently, there are no firewall applications available for the iPhone to filter what type of traffic is allowed (incoming or outgoing). Virtual private network (VPN) functionality is built in, but it is limited in support for different protocols. If you have an existing VPN infrastructure that ....


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free 10-Day Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint