Blackberry PlayBook Tablet Güvenlik Tekniklerine Genel Bakış - Sayfa 4

Tablet Blackberry PlayBook Tablet için çevrimiçi göz atın veya pdf Güvenlik Tekniklerine Genel Bakış indirin. Blackberry PlayBook Tablet 46 sayfaları. Tablet
Ayrıca Blackberry PlayBook Tablet için: Teknik Özellikler (21 sayfalar), Özellikler (21 sayfalar), Kullanıcı Kılavuzu (48 sayfalar), Güvenlik ve Ürün Bilgileri (19 sayfalar), Kullanıcı Kılavuzu (42 sayfalar), Hızlı Başlangıç Kılavuzu (2 sayfalar), Ui Manuallines (39 sayfalar), Kullanıcı Kılavuzu (34 sayfalar)

Blackberry PlayBook Tablet Güvenlik Tekniklerine Genel Bakış
IT policy rules that apply to a tablet.................................................................................................................
6 The BlackBerry Tablet OS..................................................................................................................................
The tablet file system........................................................................................................................................
How the BlackBerry Tablet OS uses sandboxing to protect application data...................................................
How the BlackBerry Tablet OS manages the resources on the tablet..............................................................
How the tablet manages permissions for applications.....................................................................................
How the tablet verifies the boot ROM code.....................................................................................................
How the tablet manages software updates......................................................................................................
7 Protecting user information.............................................................................................................................
Using the smartphone password to help protect access to the tablet.............................................................
Using the tablet password................................................................................................................................
Deleting data from the tablet memory.............................................................................................................
smartphone data..............................................................................................................................................
Symmetric encryption algorithms.....................................................................................................................
Asymmetric encryption algorithms..................................................................................................................
Hash algorithms................................................................................................................................................
Message authentication codes.........................................................................................................................
Signature scheme algorithms...........................................................................................................................
Key agreement schemes...................................................................................................................................
Cryptographic protocols...................................................................................................................................
Cryptographic APIs............................................................................................................................................
VPN cryptographic support...............................................................................................................................
Wi-Fi cryptographic support.............................................................................................................................
9 Attacks that the BlackBerry Bridge pairing process is designed to prevent.....................................................
Brute-force attack.............................................................................................................................................
Online dictionary attack....................................................................................................................................
Eavesdropping..................................................................................................................................................
Impersonating a smartphone...........................................................................................................................
Man-in-the-middle attack.................................................................................................................................
Small subgroup attack......................................................................................................................................
10 Glossary............................................................................................................................................................
11 Provide feedback..............................................................................................................................................
24
25
25
26
26
26
27
27
28
28
28
29
29
31
31
31
32
32
32
32
33
33
33
33
35
35
35
35
36
36
36
37
41