SlideShare ist ein Scribd-Unternehmen logo
1 von 45
Mobility WebCastiPhone and iPad Security Simon Guest Director, Mobility Solutions Neudesic, LLC simon.guest@neudesic.com
Common Questions I don’t want my employees doing [x].  How do I configure policy? What happens if I leave my device on the [bus|train|plane]? How do I secure communication from the device? I’m writing an application.  How do I make my application secure? What other bad stuff should I be thinking about?
2 3 4 5 1 Policy Data Network Application Bad Stuff Agenda
2 3 4 5 1 Policy Data Network Application Bad Stuff Agenda I don’t want my employees doing [x] on their device.   How do I configure policy?
Policy Passcode Policy ,[object Object]
Prompts user for code, entered on startup and wake
With no code, emergency calls onlyConfiguring on the Device ,[object Object]
Simple (4 pin) or Complex (Alphanumeric)
Wipe on x incorrect attempts (default 10)
Used in combination with auto-lock,[object Object]
Allow simple (4 digit PIN) or alphanumeric
Passcode length (1 – 16 chars)
Minimum number of complex characters
Minimum passcode age (None/1 – 730 days)
Auto lock (None/1-5 mins)
Passcode history (None/1-50 passcodes)
Grace period for device lock (None to 4 hrs)
Max number of failed attempts (4 – 16),[object Object]
Allow simple (4 digit PIN) or alphanumeric
Passcode length (1 – 16 chars)
Minimum number of complex characters
Minimum passcode age (None/1 – 730 days)
Auto lock (None/1-5 mins)
Passcode history (None/1-50 passcodes)
Grace period for device lock (None to 4 hrs)
Max number of failed attempts (4 – 16),[object Object]
Allow simple (4 digit PIN) or alphanumeric
Passcode length (1 – 16 chars)
Minimum number of complex characters
Minimum passcode age (None/1 – 730 days)
Auto lock (None/1-5 mins)
Passcode history (None/1-50 passcodes)
Grace period for device lock (None to 4 hrs)
Max number of failed attempts (4 – 16),[object Object]
Defaults to 4 digit pin code, entered on startup and wakeDevice Settings ,[object Object]
Simple (4 pin) or Complex (Alphanumeric)
Wipe on x incorrect attempts (default 10)
Used in combination with auto-lock,[object Object]
Policy Restrictions on Device Features ,[object Object],Restrictions on Applications ,[object Object],Content Rating Restrictions ,[object Object],[object Object]
VPN
Email
ActiveSync
LDAP Directory
CalDAV
CardDAV

Weitere Àhnliche Inhalte

Was ist angesagt?

Pentesting web applications
Pentesting web applicationsPentesting web applications
Pentesting web applicationsSatish b
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla IsolationCybryx
 
Mobile Device Mismanagement
Mobile Device MismanagementMobile Device Mismanagement
Mobile Device Mismanagementbreenmachine
 
Android Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed AdamAndroid Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed AdamMohammed Adam
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7Rapid7
 
Hacking and securing ios applications
Hacking and securing ios applicationsHacking and securing ios applications
Hacking and securing ios applicationsSatish b
 
Security testing in mobile applications
Security testing in mobile applicationsSecurity testing in mobile applications
Security testing in mobile applicationsJose Manuel Ortega Candel
 
Mobile security
Mobile securityMobile security
Mobile securityStefaan
 
Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1Subhransu Behera
 
(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013STO STRATEGY
 
Andersson Elffers Felix integrates physical and digital access with SafeNet e...
Andersson Elffers Felix integrates physical and digital access with SafeNet e...Andersson Elffers Felix integrates physical and digital access with SafeNet e...
Andersson Elffers Felix integrates physical and digital access with SafeNet e...SafeNet
 
(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013STO STRATEGY
 
Astaro Customer presentation
Astaro Customer presentationAstaro Customer presentation
Astaro Customer presentationronhashjr
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 
(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013STO STRATEGY
 
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015Ajin Abraham
 
Đ’Đ·Đ°ĐžĐŒĐŸĐŽĐ”ĐčстĐČОД с Check Point Technical Support
Đ’Đ·Đ°ĐžĐŒĐŸĐŽĐ”ĐčстĐČОД с Check Point Technical SupportĐ’Đ·Đ°ĐžĐŒĐŸĐŽĐ”ĐčстĐČОД с Check Point Technical Support
Đ’Đ·Đ°ĐžĐŒĐŸĐŽĐ”ĐčстĐČОД с Check Point Technical SupportGroup of company MUK
 

Was ist angesagt? (20)

Pentesting web applications
Pentesting web applicationsPentesting web applications
Pentesting web applications
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
Mobile Device Mismanagement
Mobile Device MismanagementMobile Device Mismanagement
Mobile Device Mismanagement
 
Android Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed AdamAndroid Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed Adam
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 
Hacking and securing ios applications
Hacking and securing ios applicationsHacking and securing ios applications
Hacking and securing ios applications
 
Security testing in mobile applications
Security testing in mobile applicationsSecurity testing in mobile applications
Security testing in mobile applications
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Mobile security
Mobile securityMobile security
Mobile security
 
Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1
 
(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013
 
Andersson Elffers Felix integrates physical and digital access with SafeNet e...
Andersson Elffers Felix integrates physical and digital access with SafeNet e...Andersson Elffers Felix integrates physical and digital access with SafeNet e...
Andersson Elffers Felix integrates physical and digital access with SafeNet e...
 
(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013
 
Astaro Customer presentation
Astaro Customer presentationAstaro Customer presentation
Astaro Customer presentation
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013
 
iOS Application Penetration Testing
iOS Application Penetration TestingiOS Application Penetration Testing
iOS Application Penetration Testing
 
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
 
Đ’Đ·Đ°ĐžĐŒĐŸĐŽĐ”ĐčстĐČОД с Check Point Technical Support
Đ’Đ·Đ°ĐžĐŒĐŸĐŽĐ”ĐčстĐČОД с Check Point Technical SupportĐ’Đ·Đ°ĐžĐŒĐŸĐŽĐ”ĐčстĐČОД с Check Point Technical Support
Đ’Đ·Đ°ĐžĐŒĐŸĐŽĐ”ĐčстĐČОД с Check Point Technical Support
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 

Andere mochten auch

iPhone/iPadćŒ€ć‘èźČćș§ 珏äșŒèźČ iPhoneç”šæˆ·ç•ŒéąèźŸèźĄ
iPhone/iPadćŒ€ć‘èźČćș§ 珏äșŒèźČ iPhoneç”šæˆ·ç•ŒéąèźŸèźĄiPhone/iPadćŒ€ć‘èźČćș§ 珏äșŒèźČ iPhoneç”šæˆ·ç•ŒéąèźŸèźĄ
iPhone/iPadćŒ€ć‘èźČćș§ 珏äșŒèźČ iPhoneç”šæˆ·ç•ŒéąèźŸèźĄHao Peiqiang
 
Apple iPhone and iPad at IBM
Apple iPhone and iPad at IBMApple iPhone and iPad at IBM
Apple iPhone and iPad at IBMChris Sparshott
 
iPhone Development Overview
iPhone Development OverviewiPhone Development Overview
iPhone Development OverviewWilliam Taysom
 
Penetration testing of i phone-ipad applications
Penetration testing of i phone-ipad applicationsPenetration testing of i phone-ipad applications
Penetration testing of i phone-ipad applicationsshehab najjar
 
CSS - OOCSS, SMACSS and more
CSS - OOCSS, SMACSS and moreCSS - OOCSS, SMACSS and more
CSS - OOCSS, SMACSS and moreRuss Weakley
 
M11 Manual
M11 ManualM11 Manual
M11 Manualguestac4d57
 
Marketing Mix of Apple iPhone
Marketing Mix of Apple iPhoneMarketing Mix of Apple iPhone
Marketing Mix of Apple iPhonePratik Shah
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011photomatt
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerLuminary Labs
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not AppsNatasha Murashev
 

Andere mochten auch (12)

iPhone/iPadćŒ€ć‘èźČćș§ 珏äșŒèźČ iPhoneç”šæˆ·ç•ŒéąèźŸèźĄ
iPhone/iPadćŒ€ć‘èźČćș§ 珏äșŒèźČ iPhoneç”šæˆ·ç•ŒéąèźŸèźĄiPhone/iPadćŒ€ć‘èźČćș§ 珏äșŒèźČ iPhoneç”šæˆ·ç•ŒéąèźŸèźĄ
iPhone/iPadćŒ€ć‘èźČćș§ 珏äșŒèźČ iPhoneç”šæˆ·ç•ŒéąèźŸèźĄ
 
Apple iPhone and iPad at IBM
Apple iPhone and iPad at IBMApple iPhone and iPad at IBM
Apple iPhone and iPad at IBM
 
iPhone Development Overview
iPhone Development OverviewiPhone Development Overview
iPhone Development Overview
 
Penetration testing of i phone-ipad applications
Penetration testing of i phone-ipad applicationsPenetration testing of i phone-ipad applications
Penetration testing of i phone-ipad applications
 
CSS - OOCSS, SMACSS and more
CSS - OOCSS, SMACSS and moreCSS - OOCSS, SMACSS and more
CSS - OOCSS, SMACSS and more
 
The iPhone Evolution
The iPhone EvolutionThe iPhone Evolution
The iPhone Evolution
 
M11 Manual
M11 ManualM11 Manual
M11 Manual
 
Marketing Mix of Apple iPhone
Marketing Mix of Apple iPhoneMarketing Mix of Apple iPhone
Marketing Mix of Apple iPhone
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Ähnlich wie iPhone Security WebCast

LANDesk Mobility Manager
LANDesk Mobility ManagerLANDesk Mobility Manager
LANDesk Mobility ManagerInfraVision
 
Mobility manager 90
Mobility manager 90Mobility manager 90
Mobility manager 90Axle-IT
 
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3miOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3mPrem Kumar (OSCP)
 
R U aBLE? BLE Application Hacking
R U aBLE? BLE Application HackingR U aBLE? BLE Application Hacking
R U aBLE? BLE Application HackingTal Melamed
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementJohn Rhoton
 
Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finaljasonlan
 
Mobile, IoT, Clouds
 It’s time to hire your own risk manager!
Mobile, IoT, Clouds
 It’s time to hire your own risk manager!Mobile, IoT, Clouds
 It’s time to hire your own risk manager!
Mobile, IoT, Clouds
 It’s time to hire your own risk manager!DefCamp
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015SLBdiensten
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)mike parks
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalistsShanmugavel Sankaran
 
Why Go Beyond Encryption
Why Go Beyond EncryptionWhy Go Beyond Encryption
Why Go Beyond Encryptionguest990c6c
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersITExamAnswers.net
 
Information security questions
Information security questions Information security questions
Information security questions gamemaker762
 
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)jasonlan
 
Mobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring BudgetMobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring BudgetBrent Muir
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Cisco do Brasil
 
Are Your Mobile Apps Secure? (Part I)
Are Your Mobile Apps Secure? (Part I)Are Your Mobile Apps Secure? (Part I)
Are Your Mobile Apps Secure? (Part I)Nagarro
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityIntel IT Center
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
Tips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile AppsTips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile AppsTechWell
 

Ähnlich wie iPhone Security WebCast (20)

LANDesk Mobility Manager
LANDesk Mobility ManagerLANDesk Mobility Manager
LANDesk Mobility Manager
 
Mobility manager 90
Mobility manager 90Mobility manager 90
Mobility manager 90
 
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3miOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3m
 
R U aBLE? BLE Application Hacking
R U aBLE? BLE Application HackingR U aBLE? BLE Application Hacking
R U aBLE? BLE Application Hacking
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy Enforcement
 
Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23final
 
Mobile, IoT, Clouds
 It’s time to hire your own risk manager!
Mobile, IoT, Clouds
 It’s time to hire your own risk manager!Mobile, IoT, Clouds
 It’s time to hire your own risk manager!
Mobile, IoT, Clouds
 It’s time to hire your own risk manager!
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
Why Go Beyond Encryption
Why Go Beyond EncryptionWhy Go Beyond Encryption
Why Go Beyond Encryption
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
Information security questions
Information security questions Information security questions
Information security questions
 
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
 
Mobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring BudgetMobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring Budget
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Are Your Mobile Apps Secure? (Part I)
Are Your Mobile Apps Secure? (Part I)Are Your Mobile Apps Secure? (Part I)
Are Your Mobile Apps Secure? (Part I)
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Tips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile AppsTips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile Apps
 

Mehr von Simon Guest

10 Life Hacks for Better Productivity
10 Life Hacks for Better Productivity10 Life Hacks for Better Productivity
10 Life Hacks for Better ProductivitySimon Guest
 
Building a Great Engineering Culture
Building a Great Engineering CultureBuilding a Great Engineering Culture
Building a Great Engineering CultureSimon Guest
 
Interviewing Techniques
Interviewing TechniquesInterviewing Techniques
Interviewing TechniquesSimon Guest
 
Presentation Anti-Patterns
Presentation Anti-PatternsPresentation Anti-Patterns
Presentation Anti-PatternsSimon Guest
 
10 Life Hacks for Better Productivity
10 Life Hacks for Better Productivity10 Life Hacks for Better Productivity
10 Life Hacks for Better ProductivitySimon Guest
 
Automated Web Testing using JavaScript
Automated Web Testing using JavaScriptAutomated Web Testing using JavaScript
Automated Web Testing using JavaScriptSimon Guest
 
Advanced Tips & Tricks for using Angular JS
Advanced Tips & Tricks for using Angular JSAdvanced Tips & Tricks for using Angular JS
Advanced Tips & Tricks for using Angular JSSimon Guest
 
Indoor location in mobile applications using iBeacons
Indoor location in mobile applications using iBeaconsIndoor location in mobile applications using iBeacons
Indoor location in mobile applications using iBeaconsSimon Guest
 
Creating Context-Aware Applications
Creating Context-Aware ApplicationsCreating Context-Aware Applications
Creating Context-Aware ApplicationsSimon Guest
 
Automated Testing using JavaScript
Automated Testing using JavaScriptAutomated Testing using JavaScript
Automated Testing using JavaScriptSimon Guest
 
Enterprise Social Networking - Myth or Magic?
Enterprise Social Networking - Myth or Magic?Enterprise Social Networking - Myth or Magic?
Enterprise Social Networking - Myth or Magic?Simon Guest
 
Objective View of MEAPs
Objective View of MEAPsObjective View of MEAPs
Objective View of MEAPsSimon Guest
 
Top Ten Tips for HTML5/Mobile Web Development
Top Ten Tips for HTML5/Mobile Web DevelopmentTop Ten Tips for HTML5/Mobile Web Development
Top Ten Tips for HTML5/Mobile Web DevelopmentSimon Guest
 
Windows Azure Toolkit for iOS
Windows Azure Toolkit for iOSWindows Azure Toolkit for iOS
Windows Azure Toolkit for iOSSimon Guest
 
Developing Enterprise-Grade Mobile Applications
Developing Enterprise-Grade Mobile ApplicationsDeveloping Enterprise-Grade Mobile Applications
Developing Enterprise-Grade Mobile ApplicationsSimon Guest
 
My customers are using iPhone/Android, but I'm a Microsoft Guy.
My customers are using iPhone/Android, but I'm a Microsoft Guy.My customers are using iPhone/Android, but I'm a Microsoft Guy.
My customers are using iPhone/Android, but I'm a Microsoft Guy.Simon Guest
 
Developing iPhone and iPad apps that leverage Windows Azure
Developing iPhone and iPad apps that leverage Windows AzureDeveloping iPhone and iPad apps that leverage Windows Azure
Developing iPhone and iPad apps that leverage Windows AzureSimon Guest
 
Building solutions on the Microsoft platform that target iPhone, iPad, and An...
Building solutions on the Microsoft platform that target iPhone, iPad, and An...Building solutions on the Microsoft platform that target iPhone, iPad, and An...
Building solutions on the Microsoft platform that target iPhone, iPad, and An...Simon Guest
 
Future of Mobility
Future of MobilityFuture of Mobility
Future of MobilitySimon Guest
 
Patterns for Cloud Computing
Patterns for Cloud ComputingPatterns for Cloud Computing
Patterns for Cloud ComputingSimon Guest
 

Mehr von Simon Guest (20)

10 Life Hacks for Better Productivity
10 Life Hacks for Better Productivity10 Life Hacks for Better Productivity
10 Life Hacks for Better Productivity
 
Building a Great Engineering Culture
Building a Great Engineering CultureBuilding a Great Engineering Culture
Building a Great Engineering Culture
 
Interviewing Techniques
Interviewing TechniquesInterviewing Techniques
Interviewing Techniques
 
Presentation Anti-Patterns
Presentation Anti-PatternsPresentation Anti-Patterns
Presentation Anti-Patterns
 
10 Life Hacks for Better Productivity
10 Life Hacks for Better Productivity10 Life Hacks for Better Productivity
10 Life Hacks for Better Productivity
 
Automated Web Testing using JavaScript
Automated Web Testing using JavaScriptAutomated Web Testing using JavaScript
Automated Web Testing using JavaScript
 
Advanced Tips & Tricks for using Angular JS
Advanced Tips & Tricks for using Angular JSAdvanced Tips & Tricks for using Angular JS
Advanced Tips & Tricks for using Angular JS
 
Indoor location in mobile applications using iBeacons
Indoor location in mobile applications using iBeaconsIndoor location in mobile applications using iBeacons
Indoor location in mobile applications using iBeacons
 
Creating Context-Aware Applications
Creating Context-Aware ApplicationsCreating Context-Aware Applications
Creating Context-Aware Applications
 
Automated Testing using JavaScript
Automated Testing using JavaScriptAutomated Testing using JavaScript
Automated Testing using JavaScript
 
Enterprise Social Networking - Myth or Magic?
Enterprise Social Networking - Myth or Magic?Enterprise Social Networking - Myth or Magic?
Enterprise Social Networking - Myth or Magic?
 
Objective View of MEAPs
Objective View of MEAPsObjective View of MEAPs
Objective View of MEAPs
 
Top Ten Tips for HTML5/Mobile Web Development
Top Ten Tips for HTML5/Mobile Web DevelopmentTop Ten Tips for HTML5/Mobile Web Development
Top Ten Tips for HTML5/Mobile Web Development
 
Windows Azure Toolkit for iOS
Windows Azure Toolkit for iOSWindows Azure Toolkit for iOS
Windows Azure Toolkit for iOS
 
Developing Enterprise-Grade Mobile Applications
Developing Enterprise-Grade Mobile ApplicationsDeveloping Enterprise-Grade Mobile Applications
Developing Enterprise-Grade Mobile Applications
 
My customers are using iPhone/Android, but I'm a Microsoft Guy.
My customers are using iPhone/Android, but I'm a Microsoft Guy.My customers are using iPhone/Android, but I'm a Microsoft Guy.
My customers are using iPhone/Android, but I'm a Microsoft Guy.
 
Developing iPhone and iPad apps that leverage Windows Azure
Developing iPhone and iPad apps that leverage Windows AzureDeveloping iPhone and iPad apps that leverage Windows Azure
Developing iPhone and iPad apps that leverage Windows Azure
 
Building solutions on the Microsoft platform that target iPhone, iPad, and An...
Building solutions on the Microsoft platform that target iPhone, iPad, and An...Building solutions on the Microsoft platform that target iPhone, iPad, and An...
Building solutions on the Microsoft platform that target iPhone, iPad, and An...
 
Future of Mobility
Future of MobilityFuture of Mobility
Future of Mobility
 
Patterns for Cloud Computing
Patterns for Cloud ComputingPatterns for Cloud Computing
Patterns for Cloud Computing
 

KĂŒrzlich hochgeladen

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂșjo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

KĂŒrzlich hochgeladen (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

iPhone Security WebCast

  • 1. Mobility WebCastiPhone and iPad Security Simon Guest Director, Mobility Solutions Neudesic, LLC simon.guest@neudesic.com
  • 2. Common Questions I don’t want my employees doing [x]. How do I configure policy? What happens if I leave my device on the [bus|train|plane]? How do I secure communication from the device? I’m writing an application. How do I make my application secure? What other bad stuff should I be thinking about?
  • 3. 2 3 4 5 1 Policy Data Network Application Bad Stuff Agenda
  • 4. 2 3 4 5 1 Policy Data Network Application Bad Stuff Agenda I don’t want my employees doing [x] on their device. How do I configure policy?
  • 5.
  • 6. Prompts user for code, entered on startup and wake
  • 7.
  • 8. Simple (4 pin) or Complex (Alphanumeric)
  • 9. Wipe on x incorrect attempts (default 10)
  • 10.
  • 11. Allow simple (4 digit PIN) or alphanumeric
  • 12. Passcode length (1 – 16 chars)
  • 13. Minimum number of complex characters
  • 14. Minimum passcode age (None/1 – 730 days)
  • 17. Grace period for device lock (None to 4 hrs)
  • 18.
  • 19. Allow simple (4 digit PIN) or alphanumeric
  • 20. Passcode length (1 – 16 chars)
  • 21. Minimum number of complex characters
  • 22. Minimum passcode age (None/1 – 730 days)
  • 25. Grace period for device lock (None to 4 hrs)
  • 26.
  • 27. Allow simple (4 digit PIN) or alphanumeric
  • 28. Passcode length (1 – 16 chars)
  • 29. Minimum number of complex characters
  • 30. Minimum passcode age (None/1 – 730 days)
  • 33. Grace period for device lock (None to 4 hrs)
  • 34.
  • 35.
  • 36. Simple (4 pin) or Complex (Alphanumeric)
  • 37. Wipe on x incorrect attempts (default 10)
  • 38.
  • 39.
  • 40. VPN
  • 41. Email
  • 47. Web ClipsAbove are not restrictions (with the exception of Web Clip removal)
  • 48.
  • 50. Implemented in Windows Server 2008 R2 as Network Device Enrollment Service (NDES)
  • 51.
  • 52. Policy for GPRS access point, username, and password. Policy for Proxy Server (but this is for GPRS access point only)
  • 53.
  • 54. Policy Mobile Device Management (MDM) Remote Configuration Pushing of configuration profiles to the device Remote Query Device, network, security, and application information Remote Management Remote wipe, remote lock, clear passcode, OTA application delivery
  • 55. Policy Mobile Device Management (MDM) API Level MDMS APIs announced with iOS 4.2 Very little public information, only available to MDM providers via separate agreement from Apple Products/Vendors AirWatch, Sybase Afaria, MobileIron Microsoft announced MDM support in SCCM 2012 http://www.zdnet.com/blog/microsoft/microsoft-readies-tool-for-managing-ipads-iphones-and-android-devices/8987 Beta 2 - http://www.microsoft.com/systemcenter/en/us/configuration-manager/cm-vnext-beta.aspx
  • 56. 2 3 4 5 1 Policy Data Network Application Bad Stuff Agenda What happens if I leave my device on the [bus|train|plane]?
  • 57. Data Hardware Based Encryption Anything written to (flash) storage encrypted with a 256-bit AES key Cannot be disabled by users Primarily designed for remote wipe (delete the key, and data is inaccessible) Savvy hacker can very easily get access to the data, even if pin-code protected Boot the device in recovery mode, SSH and various shell scripts to extract the data
  • 58. Data Data Protection (post iOS 4.2) Anything written to (flash) storage encrypted with a 256-bit AES key, derived from the user’s passcode Strength of data protection dependent on passcode strength Brute force with 4 digit simple PIN. A little more challenging when alphanumeric, including non-alpha characters Mitigated by PBKDF2 iterations (50ms derivation = ~20 passwords per second) However, only applies to applications that use Data Protection API
  • 59. Data Data Protection API When writing NSData object to file, include the NSDataWritingFileProtectionComplete attribute However, your application now needs to handle failure If application is running in background when the device is locked, you will not be able to access file
  • 60. Data Keychain The keychain is an encrypted container that holds passwords for multiple applications and secure services. (Apple Keychain services programming guide) Franhofer Institute Paper and Video “Lost Phone? Lost Passwords!” http://www.sit.fraunhofer.de/en/Images/sc_iPhone%20Passwords_tcm502-80443.pdf http://www.youtube.com/watch?v=uVGiNAs-QbY Accessed the keychain using techniques described in last section “Jailbroke” the device, booted into tethered Jailbreak mode, copied script to dump contents of Keychain Some passwords, not all, were revealed
  • 61. Data Keychain The Keychain supports several methods of encryption: kSecAttrAccessibleAlways – always accessible kSecAttrAccessibleWhenUnlocked - only accessible when device is unlocked kSecAttrAccessibleAfterFirstUnlock - accessible while locked. But if the device is restarted it must first be unlocked for data to be accessible again kSecAttrAccessibleWhenUnlockedThisDeviceOnly - only accessible when device is unlocked – device specific kSecAttrAccessibleAfterFirstUnlockThisDeviceOnly - accessible while locked. But if the device is restarted it must first be unlocked for data to be accessible again – device specific kSecAttrAccessibleAlwaysThisDeviceOnly – always accessible– device specific Resources http://labs.neohapsis.com/2011/02/28/researchers-steal-iphone-passwords-in-6-minutes-true-but-not-the-whole-story/
  • 62. Data Try to avoid – no protection Keychain The Keychain supports several methods of encryption: kSecAttrAccessibleAlways – always accessible kSecAttrAccessibleWhenUnlocked - only accessible when device is unlocked kSecAttrAccessibleAfterFirstUnlock - accessible while locked. But if the device is restarted it must first be unlocked for data to be accessible again kSecAttrAccessibleWhenUnlockedThisDeviceOnly - only accessible when device is unlocked – device specific kSecAttrAccessibleAfterFirstUnlockThisDeviceOnly - accessible while locked. But if the device is restarted it must first be unlocked for data to be accessible again – device specific kSecAttrAccessibleAlwaysThisDeviceOnly – always accessible– device specific Resources http://labs.neohapsis.com/2011/02/28/researchers-steal-iphone-passwords-in-6-minutes-true-but-not-the-whole-story/ Recommended for most apps Recommended for apps with background needs
  • 63. 2 3 4 5 1 Policy Data Network Application Bad Stuff Agenda How do I secure communication from the device?
  • 64. Network SSL/TLS SSL v3 / TLS v1 support for Web based applications Wireless Security Supported schemes WEP/WPA/WPA2 Enterprise Recommended: WPA2 Enterprise (128bit AES) 802.1x authentication protocols EAP-TLS, EAP-TTLS, EAP-FAST, EAP-SIM, PEAP v0, v1, LEAP
  • 65. Network VPN (Virtual Private Network) Support Supported Schemes Cisco IPSec, L2TP/IPSec, PPTP, SSL VPN Additional AppStore clients from Juniper, Cisco, and F5 Deployable via configuration profile VPN Proxy also configurable Support for Split IP Tunneling VPN on Demand (for cert-based authentication) Authentication Username/Password X.509 Certificate (Cisco IPSec only) Two Factor Authentication (RSA SecurID and CRYPTOCard) Resources http://developer.apple.com/library/ios/#featuredarticles/FA_VPN_Server_Configuration_for_iPhone_OS/Introduction/Introduction.html
  • 66. 2 3 4 5 1 Policy Data Network Application Bad Stuff Agenda I’m writing an application. How do I make my application secure?
  • 67. Application Authentication and Authorization Authentication No concept of users, accounts, passwords on the device Unlike Mac OS X, user is assumed to be authenticated (via pincode) No way of re-prompting user for pincode programmatically, nor locking the device Authentication for your own application will have to be custom (against back end services) Authorization No concept of roles, permissions on the device Unlike Mac OS X, user is assumed to be authorized (within the sandbox of the signed application) Resources http://developer.apple.com/library/mac/#documentation/Security/Conceptual/SecureCodingGuide/Articles/SecuritySvcs.html
  • 68. Application Accessing Secure Server-Side Resources Authentication NSURLConnection does not support NTLM auth Need to use CFNetwork or 3rd party, such as ASIHTTPRequest SSL support NSURLConnection supports SSL (prefix “https” on NSURL) Support for bypassing invalid certificates using continueWithoutCredentialForAuthenticationChallenge Support for client side certificate requests using didReceiveAuthenticationChallenge callback Resources http://stackoverflow.com/questions/933331/how-to-use-nsurlconnection-to-connect-with-ssl-for-an-untrusted-cert http://markmail.org/message/tnh2g6u5h42ive53 http://jameswilliams.me/developer/blog/2008/08/http-post-via-the-cfnetwork-stack/
  • 69. Application Password Storage Don’t store them in NSUserDefaults UI Abstracts the password, but can be easily accessed from the FileSystem/a simple backup/iPhone Explorer Use the Keychain instead (albeit referring to the previous section on Keychain) Resources http://software-security.sans.org/blog/2011/01/05/using-keychain-to-store-passwords-ios-iphone-ipad/
  • 70. Application Cryptography Support Asymmetric support through Certificate, Key, and Trust Services Manage certificates, public and private keys, trust policies Create, request certificate objects (CERs) Import certificates, keys, and identities Create public/private key pairs Represent trust policies SecKeyGeneratePair Example OSStatusSecKeyGeneratePair( CFDictionaryRefparameters, SecKeyRef*publicKey, SecKeyRef*privateKey ); Resources http://developer.apple.com/library/ios/#documentation/Security/Reference/certifkeytrustservices/Reference/reference.html#//apple_ref/doc/uid/TP30000157
  • 71. Application Cryptography Support Symmetric support through CommonCrypto Symmetric Encryption (Shared Key) From CommonCryptor.h CCCrypt(CCOperation op, CCAlgorithmalg, CCOptions options, constvoid *key, size_tkeyLength, constvoid *iv, constvoid *dataIn, size_tdataInLength, void *dataOut, size_tdataOutAvailable, size_t*dataOutMoved DES, 3DES, AES128 Digital Signatures (Digest Generation) From CommonDigest.h SHA1, SHA224, SHA256, SHA384, SHA512 CC_SHA256(constvoid *data, CC_LONG len, unsigned char *md) MD2, MD4, MD5 CC_MD5(constvoid *data, CC_LONG len, unsigned char *md) CCHmac (from CommonHMAC.h) CCHmac(kCCHmacAlgSHA256, [cKey bytes], [cKey length], [cData bytes], [cData length], buffer); Resources http://developer.apple.com/library/mac/#documentation/Darwin/Reference/ManPages/man3/CCCryptorFinal.3cc.html
  • 72. Application Cryptography Support Cryptographically secure random numbers SecRandomCopyBytes API returns cryptographically secure random number from accelerometer, compass, radio baseband Resources http://developer.apple.com/library/ios/#documentation/Security/Reference/RandomizationReference/Reference/reference.html
  • 73. 2 3 4 5 1 Policy Data Network Application Bad Stuff Agenda What other bad stuff should I be thinking about?
  • 74. Bad Stuff Jailbreaking What is Jailbreaking? Process of unlocking a device to gain full access (a.k.a. root access) to a device Allowing more control on the device by bypassing previous restrictions e.g. custom ringtones, wallpapers, software to capture network packets, VNC server for the device, etc. Constant battle between jailbreakers (iPhone Dev Team) and Apple releasing new software updates Is it Legal? In the US, under exemption to DMCA 2010, although it will void Apple’s device warranty. In other countries, best to check local laws. Is it the same as SIM unlocking? No. SIM unlocking is about using different SIMs from different operators.
  • 75. Bad Stuff Jailbreaking in the Enterprise Tethered vs. Untethered Jailbreaking Untethered = does not required USB cable and s/w to reboot device Most jailbreaks post 4.2.1 require tether Security Risks Frequent speculation on security for jailbroken devices Most originate to SSH/default password exploit iKee worm (changes wallpaper to Rick Astley background) Netherlands-based botnet-like worm uploading /etc/master.passwd file to a server in Lithuania
  • 76. Bad Stuff Plaintext in Configuration Profile Scenario Attacker grabs .mobileconfig from Email or public URL Investigates XML file for plaintext details (e.g. WLAN SSID and password) Mitigation Encrypting .mobileconfig files for device-specific deployments Placing .mobileconfig files behind authenticated pages (avoid Google filetype:mobileconfig Password)
  • 77. Bad Stuff Evil Configuration Profile Scenario Attacker generates evil .mobileconfig Signs using signature-only cert from one of the 224 root certs in the iPhone keystore SMS the .mobileconfig to a victim, fake them into installing it Mitigation Create a locked default profile to prevent this User education Apple’s removal of certain policy configuration options (e.g. proxy) Resources http://www.enterprisenetworkingplanet.com/netsecur/article.php/10952_3892776_1/Three-Steps-to-a-Cracked-iPhone.htm
  • 78. Bad Stuff Bypassing PIN code/Forensic Recovery of Disk Scenario Attacker has physical access to your device Even though locked with a PIN code, the device can still be placed in recovery code to override the PIN protection Mitigation Physical security of device Use of Data Protection API by applications installed on device (mail stores by default) Correct use of Key Chain algorithms to ensure passwords are not stored in clear Resources http://www.youtube.com/watch?v=5wS3AMbXRLs
  • 79. 2 3 4 5 1 Policy Data Network Application Bad Stuff Agenda
  • 81. Conclusion A lot to consider for iPhone and iPad Security Divide the problem in four ways Policy, data, network, and application 
but also understand about the bad stuff! Your device is as secure as the weakest link Don’t rely on one mechanism (e.g. password policy) in lieu of the rest Think like a hacker What tools would they have? What would they try? What’s the worst that could happen if they got hold of your device?
  • 82. How Neudesic Can Help Application/Device Security Review Simulate losing one of your locked devices We run it through the tools that the hackers have You get a full report of our findings Mobile Strategy Review CxO Level Mobility Review Construct mobile landscape of your organization together with the applications, integration points, and security considerations that make sense You get a framework and roadmap for mobile adoption in your organization
  • 83. Thank You! Simon Guest Director, Mobility Solutions Neudesic, LLC simon.guest@neudesic.com