- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 53字
- 2021-06-24 16:39:06
Privilege separation
iOS runs with the principle of least privilege (PoLP). It contains two user roles: root and mobile. The most important processes in the system run with root user privileges. All other applications to which the user has direct access, such as the browser and third-party applications, run with mobile user privileges.
推薦閱讀
- 數據恢復方法及案例分析
- 數字身份與元宇宙信任治理
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- Metasploit Penetration Testing Cookbook(Second Edition)
- Web安全與攻防入門很輕松(實戰超值版)
- 同態密碼學原理及算法
- 硬黑客:智能硬件生死之戰
- 數據安全與隱私計算(第3版)
- 云原生安全與DevOps保障
- Instant Java Password and Authentication Security
- 信息安全等級保護測評與整改指導手冊
- 網絡關鍵設備安全檢測實施指南
- Web安全攻防從入門到精通
- 云計算安全:關鍵技術、原理及應用
- 黑客攻防與電腦安全從新手到高手(超值版)