15.01.2024 Views

CompTIA A+ Certification All-in-One Exam Guide

  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

is reported missing. Once you know it is missing, change the user’s

credentials. Keep in mind that compromised account credentials could also be

a clue that one of the user’s devices itself has been compromised, and may be

an ongoing threat to the organization.

Unauthorized Root Access

To help secure the device, mobile operating systems all restrict the actions

(such as installing apps or changing settings) that a user can normally

perform. There are ways around these restrictions, though the name of each

method differs by OS, depending on how the OS restricts what the user can

do. In order to remove these restrictions, a user has to either jailbreak (iOS)

or root (Android) the device; let’s take a look at each.

EXAM TIP Know jailbreak and root and the OS associated with each, but

keep in mind that it’s common to see both of these terms used in relation to

removing access restrictions from any given device.

Jailbreaking means the user installs a program on the iOS device that

changes settings Apple didn’t intend for users to change. Jailbreaking allows

a user to install blocked software, such as apps that don’t come from the App

Store or apps that don’t meet Apple’s legal and quality requirements.

Jailbreaking also enables a user to unlock functionality on the device.

Rooting an Android device is a similar procedure to grant the user full

administrative access to the lower-level functionality of the device. As in the

case of jailbreaking, this is also done to install software or enable functions

that could not otherwise be used on the device. Although none of the popular

device vendors condone rooting, they have little recourse beyond voiding the

warranty if the user owns the device.

The important thing to keep in mind with all of these methods is that they

give the user more power at the expense of disabling protections that limit the

damage malicious apps can do to the device. There are some things you just

can’t use a device for without removing these restrictions, but the benefit

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!