- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 77字
- 2021-06-24 16:39:06
Data protection
Data protection is designed to protect data at rest and to make offline attacks difficult. It allows applications to leverage the user's device passcode, in concert with the device hardware encryption, to generate a strong encryption key. Later, the strong encryption key is used to encrypt the data stored on the disk. This key protects data from unauthorized access when the device is locked, so critical information is secured even if the device is compromised.
推薦閱讀
- DevSecOps敏捷安全
- 信息安全導(dǎo)論(在線實(shí)驗(yàn)+在線自測(cè))
- INSTANT Netcat Starter
- Metasploit Penetration Testing Cookbook(Third Edition)
- 開(kāi)發(fā)者的Web安全戒律:真實(shí)威脅與防御實(shí)踐
- 黑客攻防入門秘笈
- 走進(jìn)新安全:讀懂網(wǎng)絡(luò)安全威脅、技術(shù)與新思想
- 工業(yè)物聯(lián)網(wǎng)安全
- Preventing Digital Extortion
- 網(wǎng)絡(luò)安全技術(shù)及應(yīng)用(第3版)
- 軟件安全保障體系架構(gòu)
- Kerberos域網(wǎng)絡(luò)安全從入門到精通
- Web安全之深度學(xué)習(xí)實(shí)戰(zhàn)
- 無(wú)線傳感器網(wǎng)絡(luò)安全與加權(quán)復(fù)雜網(wǎng)絡(luò)抗毀性建模分析
- CTF快速上手:PicoCTF真題解析(Web篇)