Annotated Bibliography
docx
keyboard_arrow_up
School
Northern Virginia Community College *
*We aren’t endorsed by this school
Course
119
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
2
Uploaded by MegaFlowerLark18
Annotated Bibliography
Black, A. (2021, February 10). Jailbreaking: Security risks and moving past them
. Retrieved February 10, 2022, from https://www.hexnode.com/blogs/jailbreaking-security-risks-
involved/
This source discusses the method of breaking a smart device's internal defenses to acquire complete control of the operating system, which harm the device security. Rooting grants the user admin rights, allowing them to totally replace the operating system if they so wish.
Jailbreaking does not confer admin rights, but it does give users more access to their device
through the use of tweaks, which are supplementary applications.
Johansen, A. . (2019, March 22). Is Jailbreaking Safe? Norton. Retrieved February 10, 2022, from https://us.norton.com/internetsecurity-mobile-is-jailbreaking-legal-and-safe.html.
The source discusses the jailbreaking method, which allows iOS users to remove software limitations. It allows users to install apps, extensions, and other software that aren't available on Apple's App Store. The Digital Millennium Copyright Act, which tackles digital copyright issues, covers jailbreaking. It is allowed to jailbreak or root a smartphone if you are doing so to use lawfully obtained apps.
Schwartz, M. (2015, September 5). Jailbreaking IOS Devices: Risks to Users, Enterprises.
Jailbreaking iOS Devices: Risks to Users, Enterprises. Retrieved February 10, 2022, from
https://www.bankinfosecurity.com/jailbreaking-ios-devices-risks-to-users-enterprises-a-8515
This site address on iOS security advice has been changing. Wired, for example, described
six reasons why iPhone 3GS owners might want to jailbreak their phones back in 2009,
ranging from being able to run Google Voice (which Apple had banned from the App
Store) and enabling tethering to allowing users to collectively thumb their nose at various
restrictions imposed by Apple or AT&T. Non-jailbroken iOS devices, on the other hand,
can still be hacked, though experts believe such attacks are rather tough. "While this attack
is limited to jailbroken devices, we do know that there are numerous vulnerabilities in
every version of iOS - just as there are in Android - that can allow similar types of assaults
on non-jailbroken devices, says Dave Jevans, vice president of security at Apple.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help