Time
3 hours 58 minutes
Difficulty
Beginner
CEU/CPE
4

Video Transcription

00:00
Okay, so at this point, I've done a bit of lecturing. So let's see how much we're remember with a brief knowledge check. So go ahead, pause a video, take a few moments, answer the questions, and then when you're ready, resume and we can go over and answers together.
00:14
Okay, So let's go over the answers. Which Mobile OS leads the global market?
00:19
Android Android leads the global market. IOS leads the U. S. Market. Okay, what is a mobile risk? Anything that leads to harm our lost to a person or company due to a mobile device. All right, mobile risk is the summation of what? Three things? Okay, we've got vulnerabilities, threats
00:38
and assets.
00:39
Remember the distinction being between threats and risks, right? Threats is usually the active or the technology that's actually implementing the type of attack where the risk is the potential that the threat will do damage.
00:53
Okay, So what are some mobile device challenges? Okay, we've got physical size access the mobile networks, like three G and five g in wifi et cetera, and we've got OS vulnerabilities. Remember these devices? Air, just like regular os is now a day. So they have the same vulnerabilities that you're
01:11
desktop systems have access to.
01:15
Okay, what are the three major components of Iowa Security? All right, we've got system data and applications security.
01:22
And could you add 1/4? Well, yeah. We could add network security.
01:26
Even though I O. S doesn't implemented new technology. They implement the same technologies you would think of that most providers offer nowadays. S S L T L s. Those types of things.
01:38
Okay. In which layer of the IOS architecture do applications run coca Touch Pretty easy. There. That's the top most layer. Okay. Applications run in their own sandbox. All right, What? Three files or types of files? Do applications need to run IOS applications? We've got info, P list
01:57
compiled. Execute herbal and the icon images.
02:00
Okay, so in your own words, describe jailbreaking. What is it?
02:05
Well, jailbreaking is just taking the device restrictions off. That's what we're doing. We're in jail breaking device. Okay? One of the different types of jail breaks and how are they different? So we've got a couple of different types of jailbreaks, right? We've got tethered, semi tethered, untethered, semi untethered, and kpp less so. Tether jailbreaks, usually
02:23
require computer, and they take advantage of the device hardware. So they're finding vulnerabilities and the device hardware
02:28
untether jailbreaks that usually take advantage of Iowa's colonel flaws and typically don't require computer just user interaction. While they all require user interaction in some way, kpp less this is bypassing the Colonel Patch protection process. So those are the different types of jail breaks we can perform.
02:46
All right, so there's the answers to the questions. I hope you learned something there. Help you retain the knowledge. Let's go on to Android.

Up Next

Mobile Malware Analysis Fundamentals

In the Mobile Malware Analysis Fundamentals course, participants will obtain the knowledge and skills to perform basic malware analysis on mobile devices. Participants will perform these tasks by learning and implementing tools and techniques while examining malicious programs.

Instructed By

Instructor Profile Image
Brian Rogalski
CEO of Hexcapes
Instructor