- ページ 4
タブレット Blackberry PlayBook TabletのPDF セキュリティ技術概要をオンラインで閲覧またはダウンロードできます。Blackberry PlayBook Tablet 46 ページ。 Tablet
Blackberry PlayBook Tablet にも: 仕様 (21 ページ), スペック (21 ページ), ユーザーマニュアル (48 ページ), 安全性と製品情報 (19 ページ), ユーザーマニュアル (42 ページ), クイック・スタート・マニュアル (2 ページ), ウイ・マヌアリネス (39 ページ), ユーザーマニュアル (34 ページ)
IT policy rules that apply to a tablet.................................................................................................................
6 The BlackBerry Tablet OS..................................................................................................................................
The tablet file system........................................................................................................................................
How the BlackBerry Tablet OS uses sandboxing to protect application data...................................................
How the BlackBerry Tablet OS manages the resources on the tablet..............................................................
How the tablet manages permissions for applications.....................................................................................
How the tablet verifies the boot ROM code.....................................................................................................
How the tablet manages software updates......................................................................................................
7 Protecting user information.............................................................................................................................
Using the smartphone password to help protect access to the tablet.............................................................
Using the tablet password................................................................................................................................
Deleting data from the tablet memory.............................................................................................................
smartphone data..............................................................................................................................................
8 Cryptographic algorithms, codes, protocols, and APIs that the tablet supports..............................................
Symmetric encryption algorithms.....................................................................................................................
Asymmetric encryption algorithms..................................................................................................................
Hash algorithms................................................................................................................................................
Message authentication codes.........................................................................................................................
Signature scheme algorithms...........................................................................................................................
Key agreement schemes...................................................................................................................................
Cryptographic protocols...................................................................................................................................
Cryptographic APIs............................................................................................................................................
VPN cryptographic support...............................................................................................................................
Wi-Fi cryptographic support.............................................................................................................................
9 Attacks that the BlackBerry Bridge pairing process is designed to prevent.....................................................
Brute-force attack.............................................................................................................................................
Online dictionary attack....................................................................................................................................
Eavesdropping..................................................................................................................................................
Impersonating a smartphone...........................................................................................................................
Man-in-the-middle attack.................................................................................................................................
Small subgroup attack......................................................................................................................................
10 Glossary............................................................................................................................................................
11 Provide feedback..............................................................................................................................................
24
25
25
26
26
26
27
27
28
28
28
29
29
31
31
31
32
32
32
32
33
33
33
33
35
35
35
35
36
36
36
37
41