I have chosen for my case study Apple company, more precisely security on Apple devices.
Why have you chosen them as a subject?
I participate to ope day and who held the conference has talked about the lack of security in Apple devices.
Some background information about them.
I have some basic knowledge, however not enough: Apple is an American company. The company is using own operating system, which is called the macOS.
Context to your major project.
I will study different types of cyberattacks also I will including how Apple Security is broken by an attack against smart devices that are connected with Apple's devices.
My case study structure:
Introduction
Review
Method
Conclusion
In addition, I want to study two companies that are using iOS and Android.
References list:
Apple Support. (2020). Hardware security overview. [online] Available at: https://support.apple.com/en-gb/guide/security/secf020d1074/1/web/1 [Accessed 18 Feb. 2020].
Google Books. (2020). iPhone and iOS Forensics. [online] Available at: https://books.google.co.uk/books?hl=en&lr=&id=DXzb8remIh4C&oi=fnd&pg=PP1&dq=apple+company+and+its+security&ots=5GL7zVkCaZ&sig=ylKcxDO0A8WofprPDi3_YnvlZrg&redir_esc=y#v=onepage&q=apple%20company%20and%20its%20security&f=false [Accessed 19 Feb. 2020].
Schulze, M. (2020). Clipper Meets Apple vs. FBI—A Comparison of the Cryptography Discourses from 1993 and 2016. [online] Cogitatiopress.com. Available at: https://www.cogitatiopress.com/mediaandcommunication/article/view/805/805 [Accessed 19 Feb. 2020]. or
Schulze, M. (2017). Clipper Meets Apple vs. FBI—A Comparison of the Cryptography Discourses from 1993 and 2016. Media and Communication, 5(1), p.54.
Schulze, M. (2020). Clipper Meets Apple vs. FBI—A Comparison of the Cryptography Discourses from 1993 and 2016. [online] Cogitatiopress.com. Available at: https://www.cogitatiopress.com/mediaandcommunication/article/view/805/805 [Accessed 19 Feb. 2020]. or
Schulze, M. (2017). Clipper Meets Apple vs. FBI—A Comparison of the Cryptography Discourses from 1993 and 2016. Media and Communication, 5(1), p.54.
No comments:
Post a Comment