![Practical Mobile Forensics(Third Edition)](https://wfqqreader-1252317822.image.myqcloud.com/cover/305/36700305/b_36700305.jpg)
上QQ阅读APP看书,第一时间看更新
iOS security
Newer versions of iOS were designed with security at its core. At the highest level, the iOS security architecture appears as shown in the following figure:
![](https://epubservercos.yuewen.com/1471D9/19470398801593106/epubprivate/OEBPS/Images/8964eb7e-9faa-40c6-a646-8d0743fb2383.png?sign=1739410222-6IHvzAu1Vp62OZaLFEkscfBPZt4b6BHY-0-8d0d954dfdce6758b65591601904ee79)
The iOS security architecture
Apple iOS devices such as iPhone, iPad, and iPod touch are designed with layers of security. Low-level hardware features safeguard from malware attacks, and the high-level OS features prevent unauthorized use. A brief overview of the iOS security features is provided in the following sections.