Annotated Bibliography

docx

School

Northern Virginia Community College *

*We aren’t endorsed by this school

Course

119

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

2

Uploaded by MegaFlowerLark18

Report
Annotated Bibliography Black, A. (2021, February 10). Jailbreaking: Security risks and moving past them . Retrieved February 10, 2022, from https://www.hexnode.com/blogs/jailbreaking-security-risks- involved/ This source discusses the method of breaking a smart device's internal defenses to acquire complete control of the operating system, which harm the device security. Rooting grants the user admin rights, allowing them to totally replace the operating system if they so wish. Jailbreaking does not confer admin rights, but it does give users more access to their device through the use of tweaks, which are supplementary applications. Johansen, A. . (2019, March 22). Is Jailbreaking Safe? Norton. Retrieved February 10, 2022, from https://us.norton.com/internetsecurity-mobile-is-jailbreaking-legal-and-safe.html. The source discusses the jailbreaking method, which allows iOS users to remove software limitations. It allows users to install apps, extensions, and other software that aren't available on Apple's App Store. The Digital Millennium Copyright Act, which tackles digital copyright issues, covers jailbreaking. It is allowed to jailbreak or root a smartphone if you are doing so to use lawfully obtained apps. Schwartz, M. (2015, September 5). Jailbreaking IOS Devices: Risks to Users, Enterprises. Jailbreaking iOS Devices: Risks to Users, Enterprises. Retrieved February 10, 2022, from
https://www.bankinfosecurity.com/jailbreaking-ios-devices-risks-to-users-enterprises-a-8515 This site address on iOS security advice has been changing. Wired, for example, described six reasons why iPhone 3GS owners might want to jailbreak their phones back in 2009, ranging from being able to run Google Voice (which Apple had banned from the App Store) and enabling tethering to allowing users to collectively thumb their nose at various restrictions imposed by Apple or AT&T. Non-jailbroken iOS devices, on the other hand, can still be hacked, though experts believe such attacks are rather tough. "While this attack is limited to jailbroken devices, we do know that there are numerous vulnerabilities in every version of iOS - just as there are in Android - that can allow similar types of assaults on non-jailbroken devices, says Dave Jevans, vice president of security at Apple.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help