iOS is one of the largest computing platforms in the world, and that makes it a prime hacking target. Apple has hardware and software security measures in place to help keep your data safe, but how do they work?
In this session we’ll dive into the details of the iOS security infrastructure, covering storage of biometric data using the Secure Enclave, encryption and user data protection via the onboard AES-256 crypto engine, app code signing and sandboxing, mobile network and internet service security, and more.
We’ll break down and explain each aspect of iOS security so you can walk away with a better understanding of how your device is working to keep your data safe.
- iOS Security Fundamentals
- Hardware and software security features
- Encryption methodologies
- Code signing
- Mobile network and service security
Foundational Lecture – 75 Minutes
Dave Test, Penn State University
Group Leader of Technology Classrooms, Classroom and Lab Computing, Penn State
Dave is the group leader for technology classrooms at Penn State, supporting 240 PCs and 75 Macs in over 360 classrooms. He is the technical lead for Penn State’s student response system as well as the University’s lecture capture initiative.
In 2010, Dave helped cofound the Penn State MacAdmins Conference. The annual event brings nearly Mac and iOS system administrators to Penn State to share knowledge and expertise on deploying and managing Macs and iOS devices.
Dave is passionate about photography and vintage computing, with a particular love for Commodore and Amiga computers.