![Practical Mobile Forensics(Third Edition)](https://wfqqreader-1252317822.image.myqcloud.com/cover/305/36700305/b_36700305.jpg)
上QQ阅读APP看书,第一时间看更新
iOS security
Newer versions of iOS were designed with security at its core. At the highest level, the iOS security architecture appears as shown in the following figure:
![](https://epubservercos.yuewen.com/1471D9/19470398801593106/epubprivate/OEBPS/Images/8964eb7e-9faa-40c6-a646-8d0743fb2383.png?sign=1738972216-1R2ifDbdriWV5PunrOTgTX9HgxQZKLMI-0-233d6dc9cf983e7ab48400f8f1aaccfc)
The iOS security architecture
Apple iOS devices such as iPhone, iPad, and iPod touch are designed with layers of security. Low-level hardware features safeguard from malware attacks, and the high-level OS features prevent unauthorized use. A brief overview of the iOS security features is provided in the following sections.