{"id":228515,"date":"2021-10-21T09:16:07","date_gmt":"2021-10-21T01:16:07","guid":{"rendered":"https:\/\/lrxjmw.cn\/?p=228515"},"modified":"2021-10-19T09:17:14","modified_gmt":"2021-10-19T01:17:14","slug":"ios5-hardening-guide","status":"publish","type":"post","link":"https:\/\/lrxjmw.cn\/ios5-hardening-guide.html","title":{"rendered":"\u300aIOS5 Hardening Guide \u300bpdf\u7535\u5b50\u4e66\u514d\u8d39\u4e0b\u8f7d"},"content":{"rendered":"

Chapter One Introduction to Mobile Device Security Architecture Mobile devices face the same security challenges as traditional desktop computers,but their mobility means they are also exposed to a set of risks quite different tothose of a computer in a fixed location.
\nThis chapter provides the planning steps and architecture considerations necessary to set up a secure environment for mobile devices. Much of the content in this chapter is platform agnostic, but some detail is written to specific features available in iOS 5. Not all of these options discussed will be applicable to all environments.
\nAgencies need to take into account their own environment and consider their acceptable level of residual risk.
\nAssumptions
\nThis chapter makes some basic assumptions regarding the pervasive threat
\nenvironment:
\n\u2022 at some point, there will be no network connection present
\n\u2022 all radiated communication from the device has the potential to be monitored
\n\u2022 all conventional location, voice and SMS\/MMS communications are on an
\ninsecure channel
\n1 1 Although GSM for example is encrypted on some carrier networks, it is not encrypted on all, and some of the GSM encryption algorithms such
\nas A5\/1 on 2G networks are vulnerable to attack with rainbow tables. With moderate resources, it is also feasible to execute a MITM attack
\nagainst GSM voice and have the MITM tell client devices to drop any GSM encryption.<\/p>\n

\"\"<\/p>\n


\n

\u6839\u636e\u4e2d\u534e\u4eba\u6c11\u5171\u548c\u56fd\u56fd\u5bb6\u7248\u6743\u5c40\u76f8\u5173\u6cd5\u89c4\uff0c\u672c\u7ad9\u4e0d\u63d0\u4f9b\u8be5PDF\u7535\u5b50\u7248\u4e66\u7c4d
\n\u60a8\u53ef\u4ee5\u8fdb\u5165\u4ea4\u6d41\u793e\u7fa4\u4e2d\u7ee7\u7eed\u5bfb\u627e\u8d44\u6599\u6216\u8d2d\u4e70\u6b63\u7248\u4e66\u7c4d<\/p>\n

\"Linux\u4ea4\u6d41\u7fa4\" <\/a><\/p>\n

\u6280\u672f\u4ea4\u6d41\u793e\u7fa4\uff1ahttps:\/\/lrxjmw.cn\/club<\/a><\/p>\n

Linux\u4e66\u7c4d\u5728\u7ebf\u9605\u8bfb\uff1ahttps:\/\/lrxjmw.cn\/chapter-00.html<\/a><\/p>\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

Chapter One Introduction to Mobile Device Security Arch […]<\/p>\n","protected":false},"author":323,"featured_media":228517,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[430],"tags":[],"class_list":["post-228515","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-books"],"acf":[],"_links":{"self":[{"href":"https:\/\/lrxjmw.cn\/wp-json\/wp\/v2\/posts\/228515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lrxjmw.cn\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lrxjmw.cn\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lrxjmw.cn\/wp-json\/wp\/v2\/users\/323"}],"replies":[{"embeddable":true,"href":"https:\/\/lrxjmw.cn\/wp-json\/wp\/v2\/comments?post=228515"}],"version-history":[{"count":1,"href":"https:\/\/lrxjmw.cn\/wp-json\/wp\/v2\/posts\/228515\/revisions"}],"predecessor-version":[{"id":228518,"href":"https:\/\/lrxjmw.cn\/wp-json\/wp\/v2\/posts\/228515\/revisions\/228518"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lrxjmw.cn\/wp-json\/wp\/v2\/media\/228517"}],"wp:attachment":[{"href":"https:\/\/lrxjmw.cn\/wp-json\/wp\/v2\/media?parent=228515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lrxjmw.cn\/wp-json\/wp\/v2\/categories?post=228515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lrxjmw.cn\/wp-json\/wp\/v2\/tags?post=228515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}