Chapter 4. iPhone and iPad data security
• Data Security and Testing
• Recommendations for Device and Application Security
Selecting a smart phone for use within a corporation can be a daunting task because each platform contains its own benefits as well as vulnerabilities. Corporations are seeking a device that carries unique features including, more importantly, security. In this chapter on iPhone and iPad data security, mobile device administrators within companies are provided options for the protection of user data. The reader is walked through the process involved in the testing of these Apple devices in an effort to determine what type of sensitive data can be recovered from such devices. Also covered ...