Академический Документы
Профессиональный Документы
Культура Документы
Operating System
iPhone OS iPhone Apps can only be iPhone provides a Common Crypto
developed in Objective-C. The library in the libSystem dynamic
applications can invoke C library. CFNetwork is a high-level
libraries and C code. API that can be used by
applications to create and maintain
secure data streams
and to add authentication
information to a message.
Block Encryption and decryption is
also supported by the Supported
by the Certificate, Key and Trust
Services API. Storage encryption
can be achieved using KeyChain
API.
Blackberry The BlackBerry device The RIM crypto API supports a wide
supports MIDlets (Java range of asymmetric, symmetric
applications that use and hashing algorithms. It has a
standard MIDP and CLDC APIs Key Store API and a Messaging API
only) and Java applications that is CMS compliant.
that use the BlackBerry APIs.
Android All apps are written in Java Does not have support for device-
and executed within a custom level encryption. However,
JVM called Dalvik Virtual supports the javax.crypto API for
Machine. Development in C is creating encryption capable
possible but apps have to be applications. Bouncycastle's J2ME
externally compiled and then provider comes bundled with
loaded. Android.
iPhone provides the the Keychain Supports TLS/ SSL. Also has a
Services API and the Certificate, CFNetwork API, a high-level C API
Key, and Trust services API, whichthat makes it easy to create,
in turn communicate with the send, and receive serialized HTTP
internal Security Server. messages.
Because CFNetwork is built on
In iPhone OS, an application can top of Secure Transport, data
access only its own items in the stream can be encrypted using
keychain—the user is never asked any of a variety
for permission or for a password. of SSL or TLS protocol versions.
An application that
hasn’t been signed by Apple will not
execute.
An application that
hasn’t been signed by Symbian will
be an untrusted application.
Windows Mobile devices are
available in several security
configurations. The typical
configurations are locked, third-
party signed, prompt, and security-
off.
2 Data Threats
4 DoS Attacks
5 Messaging based Attacks
7
Threat Description
Attack via faulty or illegal privileged Moderate
code extensions