SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
Version 1.0
                             10 ways to secure the Apple iPhone                                                    June 10, 2009


By Michael Kassner
The Center for Internet Security (CIS) is well -known for developing security benchmarks for operating systems,
applications, network devices, and now the Apple iPhone. I’ve read the iPhone benchmark and felt that
TechRepublic’s 10 Things format would be the perfect way for me to pass along some of their advice. The
complete document can be found at the CIS benchmark portal. So let’s make sure your iPhone is secure.

1: Make sure firmware is up to date
Like computer operating system software, keeping the iPhone’s firmware up to date is important in reducing the
vulnerability footprint. The latest version of firmware is 2.2.1. Select Settings | General | About to determine what
version the iPhone is using. If the iPhone is using an older version, follow the steps below to update the firmware:

1. Connect the iPhone to the computer.
2. Open iTunes.
3. Select iPhone under Devices in the source list.
4. Select Check For Update.
5. Select Download And Install.

2: Disable Wi-Fi when not in use
This is self-apparent, yet important enough to include in the list. Most people automatically disable Wi-Fi to
conserve the battery. But knowing that disabling Wi-Fi eliminates an attack vector may be added incentive to turn
Wi-Fi on only when needed. Use the following steps to disable Wi-Fi:

1. Tap Settings.
2. Tap Wi-Fi.
3. Turn Wi-Fi off.

3: Disallow automatic association to networks
By default, the iPhone retains association settings of the Wi-Fi networks it connects to, which allows the phone to
automatically reconnect when within range. Automatic association isn’t recommended, as it’s easy to spoof
trusted networks. Still, disallowing automatic association is kind of a pain, as doing so requires you to enter the
passkey each time. I’ll leave this one up to you. To prevent automatic association use the following steps:

1. Tap Settings.
2. Select Wi-Fi (make sure Wi-Fi is on).
3. Tap the blue arrow of the network to forget.
4. Select Forget This Network.

4: Turn Bluetooth off when not being used
Features that make life easier for the user tend to make it easier for bad guys as well. Bluetooth is one such
feature; it allows many conveniences, such as the use of wireless headsets and sharing information between
phones. Yet attackers can also use it to Bluejack or Bluesnarf a phone.
For some reason, the iPhone isn’t set up to just turn off discovery. So the only way to prevent unwanted discovery
and associations is to use the following steps to turn Bluetooth off:

1. Pick Settings.
2. Tap General.

                                                               Page 1
Copyright © 2009 CNET Networks, Inc., a CBS Company. All rights reserved. TechRepublic is a registered trademark of CNET Networks, Inc
           For more downloads and a free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html
10 ways to secure the Apple iPhone


3. Tap Bluetooth.
4. Turn Bluetooth off.

5: Disable location services until needed
Turning location services off doesn’t immediately increase security; it just prevents the user’s location from being
published. I personally think disabling the service is a good idea for two reasons. First, it’s a significant battery
drain. Second, disabling the service isn’t an inconvenience. It’s simple to turn the location service back on from
within the application that needs positioning information. If so desired, follow the steps below to disable location
services:

1. Tap Settings.
2. Tap General.
3. Turn Location Services off.

6: Set a passcode
Setting a passcode definitely increases the security of the iPhone. It makes it harder for someone to gain access
to the iPhone because the phone automatically locks after a user-determined amount of inactivity. Setting a
passcode is also required for feature seven to work. Use the following steps to set a passcode:

1. Select Settings.
2. Select General.
3. Tap Passcode Lock.
4. Enter a four-digit passcode.
5. Re-enter the same passcode.

7: Erase data if too many wrong passcodes are entered
After 10 wrong passcode attempts, user settings and any data stored on the iPhone will be erased if this setting is
enabled. It’s a valuable feature because a four-digit passcode of just numbers will eventually be discovered, and
this option ensures that any sensitive information will not get into the wrong hands. Use the following steps to turn
erase data on:

1. Select Settings.
2. Tap General.
3. Choose Passcode Lock.
4. Turn Erase Data on.

8: Erase data before returning or repairing the iPhone
To some, this may be apparent, but many people don’t even think about removing sensitive data before selling or
sending their phone in for repair. Use the following steps to prevent others from accessing your personal
information:

1. Select Settings.
2. Tap General.
3. Choose Reset.
4. Select Erase All Contents And Settings.




                                                               Page 2
Copyright © 2008 CNET Networks, Inc., a CBS Company. All rights reserved. TechRepublic is a registered trademark of CNET Networks, Inc
           For more downloads and a free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html
10 ways to secure the Apple iPhone


9: Disable SMS preview
Even when the iPhone is locked, it’s still possible to preview a recently received text message. I immediately
disabled SMS preview on my iPhone, as I do not want my text messages visible when the phone is locked. If you
agree, use the following steps to turn off SMS preview:

1. Select Settings.
2. Tap General.
3. Choose Passcode Lock.
4. Turn Show SMS Preview off.

10: Disable JavaScript and plug-ins in Safari
Because the iPhone uses a fully functional Web browser, it is susceptible to all the same JavaScript and plug-in
exploits that plague normal computers. I recommend disabling JavaScript and plug-ins, but doing so breaks
certain Web page characteristics. It’s yet another balancing act between security and usability. If you want to err
on the side of security, use the following steps to disable both:

1. Select Settings.
2. Tap Safari.
3. Turn JavaScript off.
4. Turn Plug-Ins off.

Final thoughts
Most of the above security enhancements are intuitive, but I’ve found that unless prodded, most people don’t take
advantage of them. I can’t in good conscious say that applying all of these enhancements is the only way; that’s
going to be up to you. I just wanted to make sure everyone knew what was available. I also want to thank CIS
again for its diligence in preparing the iPhone security benchmark.




Additional resources

      TechRepublic's Downloads RSS Feed
      Sign up for the Downloads at TechRepublic newsletter
      Sign up for our IT Leadership Newsletter
      Check out all of TechRepublic's free newsletters
      10+ answers to your questions about IPv6
      10 Faces of Computer Malware
      10 answers to your questions about botnets

Version history
Version: 1.0
Published: June 10, 2009




                                                               Page 3
Copyright © 2008 CNET Networks, Inc., a CBS Company. All rights reserved. TechRepublic is a registered trademark of CNET Networks, Inc
           For more downloads and a free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html

Mais conteúdo relacionado

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Destaque

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Destaque (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

10 Ways To Secure Your I Phone

  • 1. Version 1.0 10 ways to secure the Apple iPhone June 10, 2009 By Michael Kassner The Center for Internet Security (CIS) is well -known for developing security benchmarks for operating systems, applications, network devices, and now the Apple iPhone. I’ve read the iPhone benchmark and felt that TechRepublic’s 10 Things format would be the perfect way for me to pass along some of their advice. The complete document can be found at the CIS benchmark portal. So let’s make sure your iPhone is secure. 1: Make sure firmware is up to date Like computer operating system software, keeping the iPhone’s firmware up to date is important in reducing the vulnerability footprint. The latest version of firmware is 2.2.1. Select Settings | General | About to determine what version the iPhone is using. If the iPhone is using an older version, follow the steps below to update the firmware: 1. Connect the iPhone to the computer. 2. Open iTunes. 3. Select iPhone under Devices in the source list. 4. Select Check For Update. 5. Select Download And Install. 2: Disable Wi-Fi when not in use This is self-apparent, yet important enough to include in the list. Most people automatically disable Wi-Fi to conserve the battery. But knowing that disabling Wi-Fi eliminates an attack vector may be added incentive to turn Wi-Fi on only when needed. Use the following steps to disable Wi-Fi: 1. Tap Settings. 2. Tap Wi-Fi. 3. Turn Wi-Fi off. 3: Disallow automatic association to networks By default, the iPhone retains association settings of the Wi-Fi networks it connects to, which allows the phone to automatically reconnect when within range. Automatic association isn’t recommended, as it’s easy to spoof trusted networks. Still, disallowing automatic association is kind of a pain, as doing so requires you to enter the passkey each time. I’ll leave this one up to you. To prevent automatic association use the following steps: 1. Tap Settings. 2. Select Wi-Fi (make sure Wi-Fi is on). 3. Tap the blue arrow of the network to forget. 4. Select Forget This Network. 4: Turn Bluetooth off when not being used Features that make life easier for the user tend to make it easier for bad guys as well. Bluetooth is one such feature; it allows many conveniences, such as the use of wireless headsets and sharing information between phones. Yet attackers can also use it to Bluejack or Bluesnarf a phone. For some reason, the iPhone isn’t set up to just turn off discovery. So the only way to prevent unwanted discovery and associations is to use the following steps to turn Bluetooth off: 1. Pick Settings. 2. Tap General. Page 1 Copyright © 2009 CNET Networks, Inc., a CBS Company. All rights reserved. TechRepublic is a registered trademark of CNET Networks, Inc For more downloads and a free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html
  • 2. 10 ways to secure the Apple iPhone 3. Tap Bluetooth. 4. Turn Bluetooth off. 5: Disable location services until needed Turning location services off doesn’t immediately increase security; it just prevents the user’s location from being published. I personally think disabling the service is a good idea for two reasons. First, it’s a significant battery drain. Second, disabling the service isn’t an inconvenience. It’s simple to turn the location service back on from within the application that needs positioning information. If so desired, follow the steps below to disable location services: 1. Tap Settings. 2. Tap General. 3. Turn Location Services off. 6: Set a passcode Setting a passcode definitely increases the security of the iPhone. It makes it harder for someone to gain access to the iPhone because the phone automatically locks after a user-determined amount of inactivity. Setting a passcode is also required for feature seven to work. Use the following steps to set a passcode: 1. Select Settings. 2. Select General. 3. Tap Passcode Lock. 4. Enter a four-digit passcode. 5. Re-enter the same passcode. 7: Erase data if too many wrong passcodes are entered After 10 wrong passcode attempts, user settings and any data stored on the iPhone will be erased if this setting is enabled. It’s a valuable feature because a four-digit passcode of just numbers will eventually be discovered, and this option ensures that any sensitive information will not get into the wrong hands. Use the following steps to turn erase data on: 1. Select Settings. 2. Tap General. 3. Choose Passcode Lock. 4. Turn Erase Data on. 8: Erase data before returning or repairing the iPhone To some, this may be apparent, but many people don’t even think about removing sensitive data before selling or sending their phone in for repair. Use the following steps to prevent others from accessing your personal information: 1. Select Settings. 2. Tap General. 3. Choose Reset. 4. Select Erase All Contents And Settings. Page 2 Copyright © 2008 CNET Networks, Inc., a CBS Company. All rights reserved. TechRepublic is a registered trademark of CNET Networks, Inc For more downloads and a free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html
  • 3. 10 ways to secure the Apple iPhone 9: Disable SMS preview Even when the iPhone is locked, it’s still possible to preview a recently received text message. I immediately disabled SMS preview on my iPhone, as I do not want my text messages visible when the phone is locked. If you agree, use the following steps to turn off SMS preview: 1. Select Settings. 2. Tap General. 3. Choose Passcode Lock. 4. Turn Show SMS Preview off. 10: Disable JavaScript and plug-ins in Safari Because the iPhone uses a fully functional Web browser, it is susceptible to all the same JavaScript and plug-in exploits that plague normal computers. I recommend disabling JavaScript and plug-ins, but doing so breaks certain Web page characteristics. It’s yet another balancing act between security and usability. If you want to err on the side of security, use the following steps to disable both: 1. Select Settings. 2. Tap Safari. 3. Turn JavaScript off. 4. Turn Plug-Ins off. Final thoughts Most of the above security enhancements are intuitive, but I’ve found that unless prodded, most people don’t take advantage of them. I can’t in good conscious say that applying all of these enhancements is the only way; that’s going to be up to you. I just wanted to make sure everyone knew what was available. I also want to thank CIS again for its diligence in preparing the iPhone security benchmark. Additional resources TechRepublic's Downloads RSS Feed Sign up for the Downloads at TechRepublic newsletter Sign up for our IT Leadership Newsletter Check out all of TechRepublic's free newsletters 10+ answers to your questions about IPv6 10 Faces of Computer Malware 10 answers to your questions about botnets Version history Version: 1.0 Published: June 10, 2009 Page 3 Copyright © 2008 CNET Networks, Inc., a CBS Company. All rights reserved. TechRepublic is a registered trademark of CNET Networks, Inc For more downloads and a free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html