- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 53字
- 2021-06-24 16:39:06
Privilege separation
iOS runs with the principle of least privilege (PoLP). It contains two user roles: root and mobile. The most important processes in the system run with root user privileges. All other applications to which the user has direct access, such as the browser and third-party applications, run with mobile user privileges.
推薦閱讀
- CTF實戰(zhàn):技術、解題與進階
- Rootkit和Bootkit:現(xiàn)代惡意軟件逆向分析和下一代威脅
- 白帽子講Web安全(紀念版)
- 網(wǎng)絡安全保障能力研究
- 安全實戰(zhàn)之滲透測試
- 反黑命令與攻防從新手到高手(微課超值版)
- 同態(tài)密碼學原理及算法
- Digital Forensics with Kali Linux
- 云原生安全與DevOps保障
- 數(shù)據(jù)安全與流通:技術、架構與實踐
- 云計算安全防護技術
- 計算機系統(tǒng)與網(wǎng)絡安全研究
- 5G網(wǎng)絡安全規(guī)劃與實踐
- CPK通向賽博安全之路:理論與實踐CPK Solution to Cyber Security:Theory and Practice
- INSTANT Microsoft Forefront UAG Mobile Configuration Starter