4MMSR-Network Security Student Seminar. iphone data protection in depth
|
|
- Vivian Douglas
- 6 years ago
- Views:
Transcription
1 4MMSR-Network Security Student Seminar iphone data protection in depth jean-baptiste.bedrune(at)sogeti.com jean.sigwald(at)sogeti.com Albin PETIT & Marion ROCARIES Ensimag April 30th, 2012 Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 1 / 26 >
2 Introduction (1) General information A lot of data in your smartphone Messages Access to Social Network (Facebook, Google +,... ) Bank account information Application of your company... Easier to stole or lost a smartphone since it s always with you Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 2 / 26 >
3 Introduction (2) iphone protections Passcode : Prevents casual device access Privilege Separation and Sanboxing : Limits access to system or other app data if local app compromised Code Signing : Only code of approved origins can execute Remote Wipe : Erase all data if phone is lost Encrypted Storage : Fast Remote Wipe Encrypted Backups : Protects data off the device Data Protection : Protects user s data when the device is locked Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 3 / 26 >
4 Outline 1 iphone Forensics ios Data Protection Storage Encryption itunes Backup 2 Attacks & Counter Measures 3 Conclusion Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 4 / 26 >
5 How is a data encrypted (Confidentiality) EMF Key File Meta Data User Passcode Key File Key Class Key Device Key File Key : randomly generated for every file that get created Class Key : randomly generated when a class is established Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 5 / 26 >
6 Device Key File System User Passcode Key Class Key 1 Class Key 2 Class Key 3 Meta Data Meta Data Meta Data Meta Data Meta Data Meta Data File Key 1 File Key 2 File Key 3 File Key 4 File Key 5 File Key 6 Class Key 1 can be NSProtectionComplete Class Key 2 can be NSFileProtectionCompleteUntilFirstUserAuthentication Class Key 3 can be NSProtectionNone Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 6 / 26 >
7 Definition Collection of Class Keys 3 types of Keybags System Backup Escrow System Keybag Keybags (1) Stored in /private/var/keybags/systembag.kb AES encrypted with a key 0x835 (this key is changed every time the user changes the passcode) Contain all the class keys for all protected data Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 7 / 26 >
8 Backup Keybag Created for each backup Keybags (2) Holds the class keys for data in the backup Class keys protected with backup password entered by user Escrow Keybag Copy of system keybag Protected with random 32 byte passcode stored on device /private/var/root/library/lockdown/escrow records Stored in the synchronized computer Allow synchronization without user have to enter his passcode (devices must have been paired) Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 8 / 26 >
9 Keychain Definition Where important information are saved (eg: Wi-fi password) Add the concept of migratable datas Every application have its own set of keychain items Protection for built-in application Item Wi-Fi passwords IMAP/POP/SMTP accounts Exchange accounts VPN itunes backup password Device certificate & private key Accessibility Always AfterFirstUnlock Always Always WhenUnlockedThisDeviceOnly AlwaysThisDeviceOnly Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 9 / 26 >
10 General Information 4 banks of 4100 blocks Each block has 128 pages ios Storage (iphone 16 Gb) Each page has 8610 bytes total Main disk partitioning Boot : Bootloader Plog : Effaceable area Nvrm : Environments variables Firm : Device tree and Boot logos Fsys : Filesystem partition (/dev/disk0) Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 10 / 26 >
11 ios 4 Key Hierachy Passcode UID Key KDF EMF Key Decrypt Key 89B Key 835 Passcode Key Effaceable Storage EMF! Dkey DAG1 System Keybag (locked) Class A Key Class B Key Class C Key Unlock systembag.kg Decrypt Class D Key Class Key... System Keybag (unlocked) Class Key Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 11 / 26 >
12 Plog partition (3 erasable lockers) EMF! Data partition encryption key, encrypted with key 0x89B Format : Length (0x20) + AES(key89B, emfkey) DKey NSProtectionNone Class key, wrapped with key 0x835 Allow to unwrap the System Keybag BAG1 System Keybag Key Format : Magic (BAG1) + IV + Key Allow to decrypt systembag.kb Erased at each passcode change Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 12 / 26 >
13 itunes Backup Backup storage One directory per backup %APPDATA%/Apple Computer/MobileSync/Backup/<udid> Can be protected by a password How does it work? File content is AES-256 encrypted (password is entered by user) Filenames are hashed (SHA1) A database contains all information (eg: Filenames, size, permissions, attributes) Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 13 / 26 >
14 itunes Backup (3) Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 14 / 26 >
15 Outline 1 iphone Forensics 2 Attacks & Counter Measures Stealing an ios device Bruteforce attack Escrow Keybag itunes Backup Decrypter 3 Conclusion Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 15 / 26 >
16 Violated security property Confidentiality Attack Steal an ios device Steal an ios device not password protected Counter-Measures Set a passcode Erase data after n invalid passcode attempts Erase Dkey and EMF Reformat data partition Generate new system key bag Use Find My iphone to : Use location services to find it Erase data (as already mentioned) Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 16 / 26 >
17 Bruteforce attack (1) Violated security property Confidentiality Requirements The ios device stolen Time and Patience Attack Try all 4-digit passcodes Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 17 / 26 >
18 Bruteforce attack (2) Consequenses If bruteforce succeeds Passcode, Passcode key Protected files access through modified HFSExplorer Unwrapped class keys Counter-measures Set an arbitrary complex passcode by turning off the simple password Use a configuration profiles to force data protection Require password length and complexity Require maximum password grace Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 18 / 26 >
19 Escrow Keybag (1) Violated security property Confidentiality Requirements Steal the Escrow Keybag from the victim s computer Read the Escrow Keybag Key from the victim s ios device Attack Compute passcode key Decrypt the Escrow Keybag Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 19 / 26 >
20 Escrow Keybag (2) Consequences Get all the class keys Have access to all the data in ios device Counter-measures Don t give access to your computer where the Escrow Keybag is installed (eg: no physical access, download the latest updates, use a firewall) Delete the Escrow Keybag Key stored on the device Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 20 / 26 >
21 Requirements itunes Backup Decrypter A basic backup (no encryption) Attack Extract files for the backup Access to all the data Counter-measures Encrypt your backup on itunes Don t give access to your computer (eg: no physical access, download the latest updates, use a firewall) Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 21 / 26 >
22 Outline 1 iphone Forensics 2 Attacks & Counter Measures 3 Conclusion Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 22 / 26 >
23 Conclusion Conclusion Apple has improved ios security : Data are encrypted on the ios device ios file protection is a complex system with multiple keys and protection level BUT this protection can be compromised if : A user does not put a password A developper does not use the correct Class Key (NSProtectionComplete vs NSProtectionNone ) A developper does not saved sensitive information in the keychain Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 23 / 26 >
24 Questions? Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 24 / 26 >
25 References Talks iphone data protection in depth (2011) - Jean-Baptiste BEDRUNE & Jean SIGWALD ios Forensics: Overcoming iphone Data Protection (Septembre 2011) - Andrey Belenko Overcoming ios data protection to re-enable iphone forensics (2011) - Andrey BELENKO Video Apple WWDC 2010, Session Securing Application Data Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 25 / 26 >
26 References Papers Lost iphone? Lost Passwords! (February 9, 2011) - Jens Heider, Matthias Boll ios Keychain Weakness FAQ (February 27, 2012) - Jens Heider, Matthias Boll Overcoming ios data protection to re-enable iphone forensics (2011)- Andrey BELENKO Software iphone Backup Browser iphone Backup Extractor Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 26 / 26 >
27 Class keys identifiers Id Class name 1 NSProtectionComplete 2 (NSFileProtectionWriteOnly) 3 NSFileProtectionCompleteUntilUserAuthentication 4 NSProtectionNone (stored in effaceable area) 5 NSFileProtectionRecovery 6 ksecattraccessiblewhenunlocked 7 ksecattraccessibleafterfirstunlock 8 ksecattraccessiblealways 9 ksecattraccessiblewhenunlockedthisdeviceonly 10 ksecattraccessibleafterfirstunlockthisdeviceonly 11 ksecattraccessiblealwaysthisdeviceonly Albin Petit & Marion Rocaries (Ensimag) iphone data protection in depth April 30th, 2012 < 27 / 26 >
SECURIMAG IOS DATA PROTECTION 1. Albin PETIT. Grenoble INP Ensimag. DRUNE (Sogeti) and Jean SIGWALD (ESEC)
SECURIMAG IOS DATA PROTECTION 1 Albin PETIT firstname.name@ensimag.fr Grenoble INP Ensimag 1 inspired by the presentation : iphone data protection in depth by Jean-Baptiste BÉ- DRUNE (Sogeti) and Jean
More informationOVERCOMING ios DATA PROTECTION TO RE-ENABLE
OVERCOMING ios DATA PROTECTION TO RE-ENABLE iphone FORENSICS ANDREY BELENKO CHIEF SECURITY RESEARCHER ELCOMSOFT CO. LTD Copyright (c) 2011 ElcomSoft Co.Ltd. CONTENTS Summary 3 iphone Forensics Before ios
More informationiphone Encryption, Apple, and The Feds David darthnull.org
iphone Encryption, Apple, and The Feds David Schuetz @DarthNull darthnull.org NoVA Hackers October 13, 2014 Background Apple s new privacy page, On devices running ios 8 : Apple cannot bypass your passcode
More informationios Keychain Weakness FAQ Further Information on ios Password Protection
Further Information on ios Password Protection Jens Heider, Matthias Boll Fraunhofer Institute for Secure Information Technology (SIT) November 22, 2011 Revision history 1.5 2011-11-22 updated: 2.1 Which
More informationSecure Data Storage on ios with SQLCipher OWASP The OWASP Foundation
Secure Data Storage on ios with SQLCipher 15.11.2012 Dr. Markus Maria Miedaner Syracom Consulting AG Dr. Yiannis Pavlosoglou USB AG markus.miedaner@syracom.de yiannis@owasp.org Copyright The Foundation
More informationPutting It (almost) all Together: ios Security. Konstantin Beznosov
Putting It (almost) all Together: ios Security Konstantin Beznosov BSD based OS Chain of trust during boot Secure Enclave Effaceable Storage (Secure deletion) Touch Id (Usable authentication) Per file
More informationios Forensics: Overcoming Data Protection
ios Forensics: Overcoming Data Protection Best Practices for Acquiring Data from ios Devices Copyright 2015 NowSecure, Inc. All Rights Reserved. Andrey Belenko Sr. Security Engineer M. Sc. in Computer
More informationios Security ios 9.3 or later May 2016
ios Security ios 9.3 or later May 2016 Contents Page 4 Page 5 Page 10 Page 18 Page 28 Page 32 Introduction System Security Secure boot chain Sy s te m S o f t w a re Authorization S e c u re E n c l ave
More informationSalesforce1 Mobile Security White Paper. Revised: April 2014
Salesforce1 Mobile Security White Paper Revised: April 2014 Table of Contents Introduction Salesforce1 Architecture Overview Authorization and Permissions Communication Security Authentication OAuth Pairing
More informationios Security ios 11 January 2018
ios Security ios 11 January 2018 Contents Page 4 Page 5 Page 12 Page 22 Page 34 Page 39 Introduction System Security Secure boot chain System Software Authorization Secure Enclave Touch ID Face ID Encryption
More informationMobility Windows 10 Bootcamp
Mobility Windows 10 Bootcamp Length: 8 days Format: Bootcamp Time: Day About This Course This boot camp is designed to provide students with the knowledge and skills required to install and configure Windows
More informationWHITE PAPER. Authentication and Encryption Design
WHITE PAPER Authentication and Encryption Design Table of Contents Introduction Applications and Services Account Creation Two-step Verification Authentication Passphrase Management Email Message Encryption
More informationBreaking into the icloud Keychain. Vladimir Katalov ElcomSoft Co.Ltd. Moscow, Russia
Breaking into the icloud Keychain Vladimir Katalov ElcomSoft Co.Ltd. Moscow, Russia ElcomSoft.com 2017 [Some of] our customers ElcomSoft.com Page 2 What do we want to hack today? 1.All user s passwords
More informationipad in Business Security Overview
ipad in Business Security Overview ipad can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods for
More informationANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS
ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps
More informationWhat s New in Device Configuration, Deployment, and Management
Session Distribution #WWDC17 What s New in Device Configuration, Deployment, and Management 304 Todd Fernandez, Senior Manager, Device Management and Server 2017 Apple Inc. All rights reserved. Redistribution
More informationSalesforce Mobile App Security Guide
Salesforce Mobile App Security Guide Version 2, 2 @salesforcedocs Last updated: November 2, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
More informationHACKING AND SECURING IOS APPLICATIONS
HACKING AND SECURING IOS APPLICATIONS -Satish B Agenda ios Security Concepts Loopholes in ios Hacking & Securing ios Applications How does loophole in ios affects the apps How easy it s to steal data from
More informationios Forensics with Open-Source Tools Andrey Belenko
ios Forensics with Open-Source Tools Andrey Belenko AGENDA Basics ios Security ios Data Protection Hands-On! FORENSICS 101 Acquisition Analysis Reporting GOALS: 1. Assuming physical access to the device
More informationDATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE
DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE Planning ahead is the easiest way to make sure your data isn t lost to the ether, even if your phone is destroyed. Luckily, Google automatically
More informationFix Three Common Accounting Firm Data Vulnerabilities
Fix Three Common Accounting Firm Data Vulnerabilities Fix Three Common Accounting Firm Data Vulnerabilities Use these step-by-step guides to protect your business from data thieves Brought to you by: Encyro
More informationMac OS X version 10.6 and Below for Students
Mac OS X version 10.6 and Below for Students The University Technology Services is privileged to offer a secure wifi network to the university community. Connecting to this network will provide you with
More informationIntro. This program can retrieve messages, call logs, pictures, contacts, apps, calendar events, s, passwords, deleted data, and much more.
FAQ Intro Thank you for purchasing MOBILedit Forensic Express. This tool preforms mobile phone content extractions and is used by professionals in law enforcement, military as well as the corporate and
More informationQuick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.
Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that
More informationManaging Devices and Corporate Data on ios
Managing Devices and Corporate Data on ios Overview Businesses everywhere are empowering their employees with iphone and ipad. Contents Overview Management Basics Separating Work and Personal Data Flexible
More informationCERTIFIED SECURE COMPUTER USER COURSE OUTLINE
CERTIFIED SECURE COMPUTER USER COURSE OUTLINE Page 1 TABLE OF CONTENT 1 COURSE DESCRIPTION... 3 2 MODULE-1: INTRODUCTION TO DATA SECURITY... 4 3 MODULE-2: SECURING OPERATING SYSTEMS... 6 4 MODULE-3: MALWARE
More informationTrend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012
Trend Micro Guide and solution to help embrace Consumerization and BYOD James Walker EMEA Product Marketing Manager 26 September 2012 Agenda Consumerization What is it? What should I do? Mobile Security
More informationSecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine Security Policy Abstract: This document specifies Security Policy enforced by the SecureDoc Cryptographic Engine compliant with the requirements of FIPS 140-2
More informationQuick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.
Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights With an easy-to-update virus protection and a dynamic yet simple interface, virus removal from your mobile
More informationProtecting Health Information
Agenda Protecting Health Information BRONSON HEALTHCARE GROUP INFORMATION TECHNOLOGY SECURITY ENGINEERING MICHAEL SMITH Personal device usage with sensitive data Mobile devices and BYOD Secure messaging
More informationProgressive Authentication in ios
Progressive Authentication in ios Genghis Chau, Denis Plotnikov, Edwin Zhang December 12 th, 2014 1 Overview In today s increasingly mobile-centric world, more people are beginning to use their smartphones
More informationWhat s New for Enterprise and Education ios 11, macos High Sierra 10.13, tvos 11, and deployment tools and services
What s New for Enterprise and Education ios 11, macos High Sierra 10.13, tvos 11, and deployment tools and services September 2017 Introduction This document is a summary of what s new in ios 11, macos
More informationENTERPRISE INFORMATION SECUIRTY. Apple ios Security Tyler Jeffords East Carolina University
1 Apple ios Security Tyler Jeffords East Carolina University 2 Abstract As we all know mobile security is on the rise and with around two hundred seventy five million iphones sold since 2007 Apple ios
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationSmartphone Security Overview
Smartphone Security Overview Jagdish Prasad Achara Speaker, Claude Castelluccia ENSIMAG, Grenoble 11 décembre 2013 J. P. Achara, C. Castelluccia (ENSIMAG, Grenoble) Smartphone Security Overview 11 décembre
More informationSafety and Security. April 2015
Safety and Security April 2015 Protecting your smartphone and your data 2 Set a passcode on your smartphone For some smartphone models: 1. Go to Settings. 2. Tap ID & Passcode. 3. Set a 4-digit passcode.
More informationAirWatch for Android Devices for AirWatch InBox
Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by Michigan Medicine ensure security for smart phones and tablets that connect to the Michigan Medicine environment.
More informationCompTIA A+ Certification ( ) Study Guide Table of Contents
CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System
More informationWeak Spots Enterprise Mobility Management. Dr. Johannes Hoffmann
Weak Spots Enterprise Mobility Management Dr. Johannes Hoffmann Personal details TÜV Informationstechnik GmbH TÜV NORD GROUP Dr. Johannes Hoffmann IT Security Business Security & Privacy Main focus: Mobile
More informationQuick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.
Quick Heal Mobile Security Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights Complete protection for your Android device that simplifies security
More informationHow to Build a Culture of Security
How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your
More informationA practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
More informationColligo Briefcase. for Good Technology. Administrator Guide
for Good Technology Administrator Guide Contents Introduction... 2 Target Audience... 2 Overview... 2 Key Features... 2 Platforms Supported... 2 SharePoint Security & Privileges... 3 for Good Technology...
More informationSecurity of End User based Cloud Services Sang Young
Security of End User based Cloud Services Sang Young Chairman, Mobile SIG Professional Information Security Association sang.young@pisa.org.hk Cloud Services you can choose Social Media Business Applications
More informationFind My Mac. Step-by-Step Procedure. 1. Setup your icloud account from your PC or Mac computer (if you don t already have one) at:
Find My Mac DESCRITION: If you misplace your Mac, the Find My Mac service will let you use a mobile device or icloud.com to find a Mac and protect your data. Simply enable the option under icloud in System
More informationCOMP116 Final Project. Shuyan Guo Advisor: Ming Chow
Digital Forensics with ios Devices COMP116 Final Project Shuyan Guo Shuyan.guo@tufts.edu Advisor: Ming Chow Abstract This project focuses on ios device forensics. The study provides a general overview
More informationCourse Outline (version 2)
Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students
More informationBreak em and Build em ios
Break em and Build em ios SecAppDev 2016 Ken van Wyk, @KRvW Leuven, Belgium 7-11 March 2016 Ken van Wyk, ken@krvw.com, @KRvW Part I - Break em! 2 Biggest issue: lost/stolen device Anyone with physical
More informationTwo-Factor Authentication (2FA) Registration Instructions Symantec VIP Access
Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access To strengthen KBR information security and safeguard company data, Information Technology will implement two-factor authentication
More informationManaging IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services
Managing IT Risk: What Now and What to Look For Presented By Tina Bode IT Assurance Services Agenda 1 2 WHAT TOP TEN IT SECURITY RISKS YOU CAN DO 3 QUESTIONS 2 IT S ALL CONNECTED Introduction All of our
More informationFace ID Security. November 2017
Face ID Security November 2017 Face ID Security Overview With a simple glance, Face ID securely unlocks iphone X. It provides intuitive and secure authentication enabled by the TrueDepth camera system,
More informationImplementing and Managing Windows 10
Implementing and Managing Windows 10 20697-1C; 5 Days; Instructor-led Course Description This course is designed to provide students with the knowledge and skills required to install and configure Windows
More informationFreeMessage Secure Messaging by GMX and WEB.DE
FreeMessage Secure Messaging by GMX and WEB.DE Encryption White Paper September 2016 Contents 1 Introduction and Intention 2 Terms and Nomenclature 3 Trust 4 Keys 5 Message Exchange 6 Group Messages 7
More informationCourse Outline. Implementing and Managing Windows 10 Course C: 5 days Instructor Led
Implementing and Managing Windows 10 Course 20697-1C: 5 days Instructor Led About this course This course is designed to provide students with the knowledge and skills required to install and configure
More informationExam /Course C or B Configuring Windows Devices
Exam 70-697/Course 20697-1C or 20697-2B Configuring Windows Devices Course 20697-1C Implementing and Managing Windows 10 About this course This course provides students with the knowledge and skills required
More informationWhite paper. April Security
White paper April 2011 Security This document This Sony Ericsson White paper is intended to give enterprise users an overview of specific smartphone features and provide details in relevant areas of technology.
More informationImplementing and Managing Windows 10
Course 20697 1C: Implementing and Managing Windows 10 Course Outline Module 1: Overview of Windows 10 This module describes the Windows 10 operating system. It describes the new features in Windows 10,
More informationData Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
More informationInstalling and Configuring Windows 10 5 Days, Instructor-led
Installing and Configuring Windows 10 5 Days, Instructor-led Course Description This course is designed to provide students with the knowledge and skills required to install and configure Windows 10 desktops
More informationMobilePASS. Security Features SOFTWARE AUTHENTICATION SOLUTIONS. Contents
MobilePASS SOFTWARE AUTHENTICATION SOLUTIONS Security Features Contents Introduction... 2 Technical Features... 2 Security Features... 3 PIN Protection... 3 Seed Protection... 3 Security Mechanisms per
More informationIf you require further assistance, please send an to with a detailed description of the issue you are encountering.
This guide is only for NEW students to Mid-Pacific Institute. ipad can only be set up at home or with an accessible Wi-Fi network. Set up cannot be performed on campus. Follow this guide to set up your
More informationSalesforce Mobile App Security Guide
Salesforce Mobile App Security Guide Version 3, 0 @salesforcedocs Last updated: October 11, 2018 Copyright 2000 2018 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
More informationCOURSE B: INSTALLING AND CONFIGURING WINDOWS 10
ABOUT THIS COURSE This course is designed to provide students with the knowledge and skills required to install and configure Windows 10 desktops and devices in a Windows Server domain corporate environment.
More informationInstalling and Configuring Windows 10
Installing and Configuring Windows 10 Course 20697-1B 5 Days Instructor-led, Hands-on Course Description This five day, instructor led course is designed to provide students with the knowledge and skills
More informationiphone Backup 1 P a g e
iphone Backup 1 Page Backing up the iphone You have two options when it comes to backing up iphones. 1) Back up using the icloud service, this will allow you to have 5 GB worth of data to be backed up
More informationMobile Hacking & Security. Ir. Arthur Donkers & Ralph Moonen, ITSX
Mobile Hacking & Security Ir. Arthur Donkers & Ralph Moonen, ITSX Introduction Who we are: Ir. Arthur Donkers Ralph Moonen ITSX 2 Agenda Mobile Threats BYOD iphone and Android hacking 3 Threats Various:
More informationFile Encryption. Steven M. Bellovin https://www.cs.columbia.edu/~smb
File Encryption Steven M. Bellovin https://www.cs.columbia.edu/~smb Why Encrypt Files? Theft of files Theft of media Theft of computer Cloud storage? I.e. Someone else s computer 1 Issues with File Encryption
More informationPlanning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On- Premises Tools
Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On- Premises Tools 20398BA - 5 Days - Instructor-led, Hands-on Introduction This five-day course teaches IT professionals
More informationios 12: Change these privacy and security settings now
ios 12: Change these privacy and security settings now Published: October 4, 2018 -- 19:05 GMT (12:05 PDT) Caption by: Adrian Kingsley-Hughes - ZDNet Introduction Installed ios 12 or bought a new iphone
More informationEnterprise Mobile Management (EMM) Policies
Enterprise Mobile Management (EMM) Policies Best Practices Guide Copyright 2016 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software
More informationQuick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.
Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that simplifies security and significantly
More informationMU2b Authentication, Authorization and Accounting Questions Set 2
MU2b Authentication, Authorization and Accounting Questions Set 2 1. You enable the audit of successful and failed policy changes. Where can you view entries related to policy change attempts? Lesson 2
More informationPassword & Tutorials Packet
& Tutorials Packet Print, staple, and use this & Tutorials Packet Sign up for Secure Backup Service: visit rowleyservices.com for a free trial & setup info Follow attached: Check iphone Camera Settings
More informationGoing Mobile at Northwestern
NUIT Tech Talk Going Mobile at Northwestern May 17, 2011 NUIT Support Center staff Today s Agenda Popular Mobile Devices iphone/ipod Touch Android Phone Windows Phone 7 BlackBerry Laptops, Tablets, and
More informationSECURE, CENTRALIZED, SIMPLE
1 SECURE, CENTRALIZED, SIMPLE Multi-platform Enterprise Mobility Management Whitepaper 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is an end-to-end, multi-platform, device,
More informationBox Competitive Sheet January 2014
This document is a comparison of file sharing and collaboration capabilities offered by Soonr Workplace and Box. Narrative is provided when there is no direct comparison between the capabilities or when
More informationSix steps to control the uncontrollable
Six steps to control the uncontrollable Learn how to use Microsoft Enterprise Mobility Suite to protect cloud apps, manage devices, and guard against advanced threats today Introduction Employees today
More informationCourse D:Implementing and Managing Windows 100
Course 20697-1D:Implementing and Managing Windows 100 About this course: This course provides students with the knowledge and skills required to install and configure Windows 10 desktops and devices in
More informationBring Your Own Device
Bring Your Own Device Individual Liable User Contents Introduction 3 Policy Document Objectives & Legal Disclaimer 3 Eligibility Considerations 4 Reimbursement Considerations 4 Security Considerations
More informationSecret-in.me. A pentester design of password secret manager
Secret-in.me A pentester design of password secret manager Who am I? Security engineer Working at SCRT France! Password manager Password A string Secret Information shared by very few people You have to
More informationNetwork Security CHAPTER 31. Solutions to Review Questions and Exercises. Review Questions
CHAPTER 3 Network Security Solutions to Review Questions and Exercises Review Questions. A nonce is a large random number that is used only once to help distinguish a fresh authentication request from
More informationGetting Started. Overview CHAPTER
1 CHAPTER This chapter provides information that you need to get started with the IPICS Mobile Client. It includes these topics: Overview, page 1-1 Obtaining the IPICS Mobile Client, page 1-4 Obtaining
More informationMobile security: Tips and tricks for securing your iphone, Android and other mobile devices
Mobile security: Tips and tricks for securing your iphone, Android and other mobile devices Presented by Michael Harris [MS, CISSP, WAPT] Systems Security Analyst University of Missouri Overview What data
More information9L0-412 Q&As. OS X Support Essentials 10.8 Exam. Pass Apple 9L0-412 Exam with 100% Guarantee
9L0-412 Q&As OS X Support Essentials 10.8 Exam Pass Apple 9L0-412 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back Assurance
More informationAllen University Microsoft Office 365
Allen University Microsoft Office 365 Here's what you need to know to complete the transition On December 18 at 5:00pm, the University will complete the migration to Office 365, a new version of the hosted
More informationChapter 10: Mobile, Linux, and OS X Operating Systems
Chapter 10: Mobile, Linux, and OS X Operating Systems IT Essentials v6.0 ITE v6.0 1 Chapter 10 - Sections & Objectives 10.1 Mobile Operating Systems Explain the purpose and characteristics of mobile operating
More informationPlanning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On-Premises Tools
Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On-Premises Tools OD20398B; On-Demand, Video-based Course Description This course teaches IT professionals how to
More informationThe purpose of this document is to help you to get started with your ipad to access Lilly resources such as , calendar, Lilly apps and more.
The purpose of this document is to help you to get started with your ipad to access Lilly resources such as email, calendar, Lilly apps and more. The setup process will take about 30 minutes to complete
More informationIf we provide the device, it is managed through Citrix XenMobile Enterprise. If you want access to our internal sites, then you have to be managed
If we provide the device, it is managed through Citrix XenMobile Enterprise. If you want access to our internal sites, then you have to be managed through Citrix XenMobile Enterprise. House member office
More informationHOW TO GET YOUR iphone UP AND RUNNING
HOW TO GET YOUR iphone UP AND RUNNING 1 CONTENTS ACTIVATING YOUR iphone PAGE 3 STEP BY STEP ACTIVATION PAGE 4-7 icloud CONTENT TRANSFER PAGE 8 itunes CONTENT TRANSFER PAGE 9 HOW TO ADD AN EMAIL ACCOUNT
More informationHOW TO GET YOUR iphone UP AND RUNNING
HOW TO GET YOUR iphone UP AND RUNNING 1 CONTENTS icloud CONTENT BACKUP PAGE 3 itunes CONTENT BACKUP PAGE 4 ACTIVATING YOUR iphone PAGE 5 STEP BY STEP ACTIVATION PAGE 6-9 HOW TO ADD AN EMAIL ACCOUNT PAGE
More informationwhitepaper ClickShare Security
ClickShare Security www.barco.com/clickshare Introduction ClickShare was introduced in 2012. Four years later, in 2016, a new generation of ClickShare Enterprise products was presented to the market. New
More informationipasssafe User Guide 1. Getting started Setup your first password
ipasssafe User Guide 1. Getting started Setup your first password When for first launch ipasssafe, you will be asked to change the default setup (0-0- 0-0) To your own private setup You should tap ok and
More informationKODO for Samsung Knox Enterprise Data Protection & Secure Collaboration Platform
& Secure Collaboration Platform by Paweł Mączka, Storware CTO Table of Contents OVERVIEW 3 WHAT IS KODO? 4 HOW IT WORKS? 5 BACKUP & RESTORE 6 TABLE OF FEATURES 8 END-TO-END ENCRYPTION FOR ANDROID DEVICES
More informationAirWatch for Android Devices for Skype for Business
Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by Michigan Medicine ensure security for smart phones and tablets that connect to the Michigan Medicine environment.
More informationLecture 10. Denial of Service Attacks (cont d) Thursday 24/12/2015
Lecture 10 Denial of Service Attacks (cont d) Thursday 24/12/2015 Agenda DoS Attacks (cont d) TCP DoS attacks DNS DoS attacks DoS via route hijacking DoS at higher layers Mobile Platform Security Models
More informationMobility Manager 9.5. Users Guide
Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks
More informationcs642 /introduction computer security adam everspaugh
cs642 computer security /introduction adam everspaugh ace@cs.wisc.edu definition Computer Security := understanding and improving the behavior of computing systems in the presence of adversaries adversaries
More informationProcedure for responding to a lost or stolen DIT mobile device
Procedure for responding to a lost or stolen DIT mobile device Version Written/Reviewed By Date 0.1 Ronan Dunphy 11th February 2016 1.0 Eoin Dunne 6th April 2016 1.1 Ronan Dunphy 21st November 2016 Table
More informationSIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT
DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,
More information