What is pdf architect extended downloaded protection






















Igbokwe, J. Lichtenberger, E. Mabogunje, A. Publishing Ltd. Mc Gianahan, G. Balk, D. Environment and Urbanization 19, 17 — Newman, P. Oyesiku, O. Phillip, M. Sepe, M. Journal of Sustainable Development Planning Vol. Wadsworth Inc. Terradas, J. Rubes ed. Toman M. Opportunities and Challenges for Sustainability in an Urbanizing.

Temple, A. Valdya C. UK, 1 — Vidfor, J. Is Urban Revitalisation Bad Too? Paper No. Waque S. Webster, D. Washington D. C: The World Bank. Zeeman, G. Sustainability rests on the principle that we must meet the needs of the present without compromising the ability of future generations to meet their own needs. Therefore, stewardship of both natural and human resources is of prime importance. Stewardship of human resources includes consideration of social responsibilities such as working and living conditions of laborers, the needs of rural communities, and consumer health and safety both in the present and the future.

Stewardship of land and natural resources involves maintaining or enhancing this vital resource base for the long term. Three kinds of reserves of natural resources can be identified Reijnders , Chapman : continuous resources such as sunlight and wind, the use of which does not lead to a reduction in their size; renewable resources, such as wood and crops that can be harvested — but not faster than their rate of replenishment; and non-renewable resources such as fossil fuels and minerals.

The last are created by very slow geological processes, so slow in human terms that their use diminishes the available stocks.

Resources such as clean water, fertile soils and biodiversity, given the time required for their recovery, can also be considered to be non-renewable. The Club of Rome first drew attention to the depletion of resources at the beginning of the s.

At that time the emphasis was on the depletion of fossil and mineral resources. It was assumed that various important natural resources such as oil and various metal ores would be exhausted within a few decades. In fact this turned out not to be true. Discoveries of new deposits, technological advances and falling energy prices have made possible the recovery of lower grade ores, and the estimated remaining lifetimes of some resources have been considerably extended.

But this is no reason for complacency. Sooner or later, at the current rate of consumption, the reserves of certain resources will be exhausted. This may be a long way off for a number of fossil fuels and mineral ores, but other resources such as biodiversity and fertile soils are being used up so quickly there is a danger that critical thresholds will be crossed.

The drain on biotic resources is particularly alarming; biodiversity and fertile soils are being rapidly used up. And there is no sign of this attack on biodiversity diminishing. The Earth's natural resources are vital to the survival and development of the human population.

Some of these resources, such as minerals, species, and habitats, are finite — once they have been exhausted or destroyed, they are gone forever.

Although many effects of over-exploitation are felt locally, the growing interdependence of nations and international trade in natural resources make their management a global issue. A careful and well planned integrated crop, livestock and fish farming will go a long way at ensuring sustainability of our natural resources and environmental protection. Selected Bibliography Anonymous. Agri-food production Facts and Figures.

Industry and Environment 22 : ISSN Chapman P. Metal resources and energy. Butterworths Monographs in Materials. De Vries S. Mijnbouw en duurzaamheid.

IVEM, Groningen. Climate Change Impacts, adaptations and mitigation of climate change: scientific technical analysis, contribution of working group II to the second assessment report of the intergovernmental panel on climate change.

ISBN 0 9. Strategy to Matthews E. Critical Consumption Trends and Implications. ISBN Working group on the state of the environment. Towards more sustainable household consumption patterns, Indicators to measure progress. Pinstrup Anderson P. Towards ecologically sustainable world food production.

Reijnders L. A normative strategy for sustainable resource choice and recycling. Resources Conservation and Recycling Nationale Milieuverkenning 5 Bilthoven: RIVM. Voetafdrukken van Nederlanders, energie en ruimtegebruik als gevolg van consumptie. Achtergronden MB98 en MB Report no. Land use, Land —use change, and Forestry. Cambridge University Press, pp. WWF International. New economics foundation. World conservation monitoring centre: Living Planet Report Gland: WWF International.

Adewuyi, 3N. Management of municipal solid waste in Nigeria has become a hydra-headed problem; the menace of solid waste in the environment has never justified both the efforts of government and individuals; and hence the need for continual research on various options for sustainable management of solid wastes. Nine different common African wood species - Irvingia gabonensis Orokoro , Celtis Zenkeri Ita , Albizia zygia Ayunre , Terminalia superba Afara , Cola gigantia Obi , Cordia millennia Omo , Funtumia elastica Ire , Ceiba petandra Araba and Ficus exasperata Obobo , were assessed for combustion and alkali production as options for management of wood waste.

The wood waste sawdust from these species was obtained from a wood factory located behind Bodija market in Ibadan. Ashing was conducted on saw dusts in porcelain o crucibles at C for 4 hours in a muffle furnace for the determination of ash contents. Extraction of potash from the ashes was done using distilled water with a set of filtration system made up of 4-litre transparent plastic bottle with ash sediment itself serving as a sieve while the extract solution leaked out through pin-holes made at the bottom of the bottle.

The purity of the crude potash and proportions of hydroxides and carbonates were determined by titrimetry; while recrystallization of the crude potash was carried out on three of the wood species which showed low purity to evaluate possible enhancement of their purity. The ash content obtained ranged from 1. Volumetric estimation may portray a better picture of ash and potash yield potentials of the plant 3 materials, and hence expressed as 1.

The hydroxide content obtained ranged from 0. The purity was enhanced from Keywords: wood waste, ash, potash, alkali. The use of wood ash in the past had primarily been restricted to its utilization as liming agent and a source of nutrients for plant Campbell, The chemical composition of an ash depends on that of the substance burned: palm bunch wastes, cocoa pod, plantain leaves, maize cob, wood and sugar beet waste Irvine, ; wood ash contains metal carbonates and oxides formed from metals originally compounded in the wood; seaweed ash contains sodium carbonate, potassium carbonate, and iodine that can be extracted CEE, Exploration of ash-derived alkalis for domestic use is an age-old craft Onyegbado et al.

Studies of chemical composition of wood ash in the past have primarily been restricted to the elemental composition Baker et al. A common assumption in most of these analyses has been that the minerals present are oxides of different elements Mahendra, et al.

The assumption may be sufficient to identify the extent of alkalinity of wood ash Shelton and Shapiro, Analysis of extracts from ashes by Nwoko and others Onyegbado et al. Tarun et al. Ashes have a composition which varies according to the kind of wood and the soil in which it grew Kevin, The physical and chemical properties of wood ash vary significantly, depending upon various factors, which in addition to the kind of wood and soil include method and manner of combustion, efficiency of the boiler, and other supplementary fuel used with wood Tarun et al.

Potassium content of some wood species were analyzed by Misra et al : pine Potash has been described as a white crystalline residue that remains after aqueous extract from ashes is evaporated Kevin, It is an impure form of potassium carbonate mixed with other potassium salts Wikipedia, These could be produced locally and industrially. There are various local extraction technologies, depending on the desired quality, quantity and intended use of the resulting potash Babayemi et al, a.

Generally, containers made of aluminum are to be avoided since alkali attacks aluminum. It consists of two clay pots of about 50 litres each mounted on each other. The one on top is open at the base, with radius about half the open top.

The open base is completely blocked with pieces of sticks, followed by a layer of wood charcoal. The remaining space on top is then packed with ashes which had already been moistened with water for some days to aid quick extraction.

Water is then carefully poured on top, as to only saturate the ashes, and not to leach the desired component yet. After few hours, when the ash would have completely absorbed the water and every large pores and air spaces blocked, sufficient water is then carefully poured on top.

The water slowly leaches the potash into the lower pot, the ash itself serving as a filter. Perhaps the charcoal removes some unwanted organics from the leaching potash. The potash produced this way is usually coloured brown, and may have contributed to the black colour of the local soap produced with it. At the top is a transparent plastic bottle of about 2 litres capacity and at the base is a beaker.

The bottle is filled with ashes to about one-third. Sufficient water is added, capped and then shaken thoroughly to dissolve the soluble components. The ash is allowed to settle, till a clear liquid is observed at the top. One or two pin- holes are made at the bottom, and then placed on the beaker, while the cap is removed.

The solution on top is filtered by the ashes as it leaks into the beaker. The potash solution obtained this way is usually clear, that is, colorless, although it also depends on the source of the ash.

One of the major management problems in the mega-cities of Nigeria is that of solid waste disposal. Wood waste and ashes take a considerable percentage of solid wastes being generated in Nigeria every day. Wood factories, including saw mills, are established in their thousands in various states, with thousands of tons of wood shavings and saw dusts being generated each day Aina, At present in Nigeria, apart from the insignificant use as poultry deep litters, the largest percentage of saw dusts and wood shavings end up in dump sites as waste, where they are burnt and the ashes carried away by flood every year.

The ashes generated, including those from combustion of firewood in various homes and food canteens, are either land-filled or open-dumped. This report evaluates the efficiency of burning and consequent extraction of alkali from the resulting ash, as options for management of wood waste.

Results and Discussion Table 1 shows the results of the moisture content, dry matter content, density of sample, and density of ashes; the values ranged from The values of ash and potash contents obtained Figure 3 ranged between 1. Crude potash purity 4. Funtumia elastica gave the highest moisture content while Funtuia elastica had the lowest dry matter content. Ceiba pentandra had the lowest moisture content, highest dry matter content, lowest density and lowest ash yield.

Terminali superba had relatively lower moisture content, relatively higher dry matter content, relatively high density and highest ash yield. Funtumia elastica gave the lowest ash yield, while Terminalia superba gave the highest. This observation was completely reversed in the case of potash yield: Terminalia superba gave the least potash yield.

A higher yield was obtained for Funtumia elastica and Ficus exasperata gave the highest yield. It may then be inferred that where ash yield is of interest, Ficus exasperata offers the best option; and where potash yield is of interest, Ficus exasperata offers the best option.

As shown in Table 3, the results of the determination of ash content in terms of volume ranged 3 3 from 1. Taking the upper value And assuming the wood 3 factories generated 82 m of sawdust per day Babayemi and Dauda, , it gave 1 Potash content of the ashes ranged 3 between 4.

Taking What a great resource! Alkali content observed for Ficus exasperata was the highest; and Irvingia gabonensis, being the least. The high alkali content suggests potential use as laboratory reagent, since these results are comparable to the recommended purity of It may then be inferred that potash from ashes is predominantly carbonate of potassium or sodium. The formation of oxides K2O and Na2O suggested by Onyegbado et al could only be true for the burning of pure metals in air; this may not be applicable to the burning of these metals in organic matrices: the potassium or sodium in plant materials is bound in organic matrix of which carbon is a major constituent.

During combustion, there is a high release of carbon IV oxide, leading to the formation of carbonate rather than oxide of the metals as suggested by these authors. Irvingia gabonensis contained the highest non-alkali content and Ficus exasperata contained the least. A very high percentage of The results obtained after the enhancement of purity of the crude potash by recrystallization show the possibility of improving upon purity of potash alkali and making it fit for various uses.

The two Figures 5 and 6 showed no correlations. Conclusion Ficus exasperata, Ceiba pentandra and Funtumia elastica gave higher potash yield and very high purities were obtained for Ficus exasperata. These wood species could be recommended as choice materials for potash production. Leaching of caustic potash from cocoa husk ash. Bioresource Technology. Aina, O. Wood waste utilization for energy generation.

Ankrah, E. Chemical studies of some plant wastes from Ghana. Journal of the Science of Food and Agriculture 25 10 , DOI: Evaluation of solid waste generation, categories and disposal options in developing countries: a case study of Nigeria. Babayemi, J. O, Dauda, K. Assessment of ancient and improved alkali production technology.

Asian Journal of Applied Sciences. In press. Determination of potash alkali and metal contents of ashes obtained from peels of some varieties of Nigeria Grown Musa species. BioResources 5 3 : Evaluation of the composition and Chemistry of ash and potash from various plant materials — a review. Journal of Applied Sciences. Baker, D. Techniques for rapid analyses of corn leaves for eleven elements. Journal 56, pp. Campbell, A.

Recycling and disposing of wood ash. Tappi 73 9 , pp. A 2a Powder Bulk Density. West African Crops. Oxford University Press.

Caveman Chemistry. Retrieved from www. Factors affecting the lixiviation of palm bunch ash as a source of alkali for soap production. Ife Journal of Technology. Manhendra, K. Wood ash composition as a function of furnace temperature.

Biomass and Bioenergy, 4 2 , pp. Practical Environmental Analysis. Misra, M. Wood Miroslav, R. Plant ash composition as a function of furnace temperature. Biomass and Bioenergy 4 2 , Chemical processing development. Nwoko, V. Effects of mixing oil on the preparation and properties of soap. Private Communications.

Ojokuku, G. Practical Chemistry for Schools and Colleges. Onyegbado, C. Solid soap production using plantain peels ash as source of alkali.

Journal of Applied Sciences and Environmental Management. Onyekwere, C. Cassava peels ash: an alternative source of alkali in soap production. Shelton, J. The wood BurnersEncyclopedia.

Vermont Crossroads Press, Waitfield. Taiwo, O. Evaluation of various agro-wastes for traditional soap production. Tarun, R. Use of wood ash in cement-based materials. Wikipedia, the free Encyclopedia, K and Adeboye, A. B Covenant University Ota, Nigeria.

Estimated costs of building projects, which hitherto have been based on regression models, are usually left with gaps for high margin of errors and as well, they lack the capacity to accommodate certain intervening variables as construction works progress.

Data of past construction projects of the past 2 years were adjusted and used for the study. This model is developed and tested as a predictive cost model for building projects based on Artificial Neural Networks ANNs. This model will help professionals save time, make more realistic decisions, and help avoid underestimating and overestimating of project costs, which are some of the advantages over previously used Regression models.

Poor cost forecasting approach will lead to underestimating or overestimating and consequently cost overrun. Project abandonment as a result of cost overrun arising from poor cost forecasting approach, is an interesting phenomenon locally as well as globally.

This phenomenon has led to various stakeholders in built environment to be aware of importance of accurate project cost right from conceptual stage of building project as well as throughout the life cycle of the project work. The awareness of working with accurate cost has thus created a trend among various clients including private, corporate, as well as public clients government , that prudency in resources allocation is a great necessity for successful execution of project works.

This development led to the advent of forecasting project cost so as to generate project cost information which reveals what the value of a project cost could be in future. However, in providing project cost information, cost estimator often resort to using traditional approach, recent developments on the other hand has proven the fact that traditional approach, which uses historical methods do not tend to capture the details of project works cost components, as well as intervening variables that impacts the cost magnitude.

The cube method was the first recorded forecasting method; this was invented about years ago, floor area approach was developed around Skitmore et al ,some researchers later developed storey enclosure method on , which provides better result over the previously developed cube and floor area, certain variables were identified and incorporated into the model other than those used in the past, like floor areas vertical positioning, storey heights, building shape and presence of basement.

However in the mids, researchers started deploying statistical techniques cost modeling, through these, conventional methods evolved, such as approximate quantities and optimization.

Peculiar to the research work in this era is possibility of demonstrating the applicability of the developed models, as a result of seemingly non applicable nature of model generated. The result of the analysis indicates high level of accuracy in the output obtained from the neural network model.

The model when developed will be simple to use. It is believed that the model will be suitable for use at different stages project work. O; OjO, and Obamiro, J. Pp Brandon, A. The Royal Institution of chartered surveyors, London. Bouabaz M and Hamami, M. American Journal of Applied Sciences.

PP56 — Copeland, J and Proudfoot, A Creese, R. Ferry, D. J; Bandon, P. S Cost Planning of Building. Blackwell th Science Limited. Garza, J and Rouhana, K. Our services. NHS online: helpful medical advice, and access to urgent healthcare. View all services??? A clear and present danger Ransomware is a growing threat across the health and care system.

NHS cyber security experts describe how it can affect organisations and what is being done to combat it. Latest blogs. How NHS Digital is helping improve cardiac arrest outcomes Cardiac arrest occurs when the heart stops beating suddenly; it is the most extreme medical emergency and requires an immediate response.

The importance of good cyber security during a pandemic Toby Griffiths, Head of Innovation and Delivery for NHS Digital's Data Security Centre, discusses how we have tackled cyber security issues and how we are addressing 'security debt' brought about by the pandemic.

All blogs??? Latest news??? An expedited plan review request form PDF must be completed and submitted to the building counter for processing. These typically include inspection fee payment, contractor information name, Arizona Registrar of Contractors license number, City of Peoria business license number and inspection contact information.

The self certification pilot program for building tenant improvement permits is another way in which the City of Peoria is committed to enhancing customer service for our building community, while ensuring safety standards remain our number one priority.

Tenant improvement projects for non-residential occupancies excluding buildings or portions of buildings:. For more information on how to register for the examination, visit: www. Arizona Licensed Design Professionals must attend a self certification training class offered by the City of Phoenix. Once certified, you must complete and provide the required forms necessary for submittal.

Provided all items are received and complete, your permit will be issued within three business days. Below are checklists and guidelines for the preparation of commercial plans to be self certified. Below are checklists and guidelines for the preparation of residential plans that may be required for a project. Once the plans are approved, City of Peoria AZ building permits must be obtained prior to commencing work.

Please contact Tom Fierros at to set up an appointment. Over the counter may also be available on second reviews for all other miscellaneous commercial permits, as well as third reviews for other types of commercial permits when all other plan reviewers have approved the plans.

Please contact the building plan reviewer directly to set up an over the counter plan review appointment. During appointment, the following shall apply:. PT-1, RS. CM-7, ID. AC-1, PR. AM-1, PR. PT-2, PR. GV-3 TR AM-2, ID. DS-6, PR. IP-1, PR. IP-6, PR. PT-3, RS. AM-4, ID. GV-3, PR. IP-1, RS. AE-1, PR. Figure provides the overall architecture of the cloud build. Devices outside the enterprise firewall can connect to Intune for configuration management and monitoring Office synchronizes with AD Domain Services DS R2 to provide email, contacts, and calendaring services.

AD DS stores directory data and manages communication between users and domains, including user log-on processes, authentication, and directory searches.

It does not require access to the Azure AD tenant that is created with the associated Office subscription. Systems Center Configuration Manager SCCM provides unified management across on-premises, service provider, and Azure environments for both Windows computers and mobile devices.

It acts as a security barrier by not allowing direct access into the AD environment from the internet and is not joined to the domain itself. Mobile users are not allowed to access enterprise email services until the target device is compliant i. Encrypting the application data setting may not provide additional cryptographic protection over full-device encryption.

Note: Use of OS-managed secure key storage by any given application is optional Restrict which application stores may be used Intune and SCCM offer a policy setting that restricts enrolled devices to installing applications from the official application store for its OS.

If a private application store is used without an explicit whitelist of applications, those from unofficial application stores could also be downloaded. The high-level process is as follows: A new enterprise user is created in the on-premises AD. The means by which this happens is outside the scope of this building block; however, many organizations choose to use a third-party identity management system The user is placed within a specific group within AD that is configured to sync identities.

A collection represents a group of users who have mobile devices to be managed The Windows Intune Connector extension installed on the SCCM system syncs the new user to the Intune cloud service The new user can now enroll in the Intune service by using the Company Portal application De-provisioning is a simple task for the system administrator in both the cloud and hybrid builds.

It is assumed that devices are hardened. Testing these devices would reveal only weaknesses in implementation that would not be relevant to those adopting this reference architecture.

Table describes the goals of each test case. Data is protected during storage and processing 2 PR. DS Protections against data leaks are implemented SC-7 Boundary Protection Monitor and control communications at the external boundary of the system and at key internal boundaries within the system Device Integrity 16 PR. DS Integrity-checking mechanisms are used to verify software, firmware, and information integrity SI-7 Software, Firmware, and Information Integrity Integrity mechanisms are running to check the integrity of software and information files 17 DE.

Anti-malware software e. The application should employ functionality to restrict upload of file types to those expressly required for operations e. Vulnerability scanners provide comprehensive coverage and employ best practices Identity and Authorization 41 PR. AC Identities and credentials are managed for authorized devices and users IA Controls The architecture accounts for multiple user roles with access privileges assigned to each role. Access controls are documented. Information is available only to authorized devices.

Access attempts for devices not enrolled produced the following results: iOS redirected the user to the organization portal, then directed the user to enroll his or her device. Android attempted to enroll the device with the active sync policy when not managed by Intune. Android would not retrieve email until the device was enrolled in SCCM and compliant with policy. When attempting to access Office services from out-of-compliance devices, users could activate the email client on the device but were unable to retrieve email.

Souppaya and K. Chen et al. Brooks et al. Quirolgico et al. May Cooper et. Regenscheid and K. Kissel et al. Badger et al. Automatically report when policy violations occur, such as changes from the approved security configuration baseline. SCCM can log the policy violations for subsequent reporting and review, which can be optionally sent to Event Viewer to enable additional monitoring and reporting functionality.

When configuring an MDM policy in SCCM, setting noncompliance severity for reports to the least information settings will log violations of any included settings in Configuration Manager [33].

Note that automatic remediation for any given policy setting may not be supported on all OS versions. Limit or prevent access to enterprise services based on the MDM software client version if applicable. Each of the mobile devices and OSes used in the build are capable of secure communications that use TLS.

Device encryption implementation varies among device manufacturers. However, when device encryption is undesirable, this setting is an alternative. If removable storage is not a necessary feature and encryption of removable storage is not supported, consider disabling the use of removable storage media. Wipe the device to scrub its stored data before reissuing it to another user, retiring the device, etc. Remotely wipe the device to scrub its stored data if it is suspected that the device has been lost, stolen, or has otherwise fallen into untrusted hands and is at risk of having its data recovered by an untrusted party.

Administrators are able to selectively or fully wipe devices by choosing the device from the SCCM console. A device often can also be configured to wipe itself after a certain number of incorrect authentication attempts.

Longer or more complex device unlock codes increase the cryptographic strength of derived device encryption key and are more resistant to discovery e. Optionally require other authentication e. Require a limit on the number of retries permitted without negative consequences e. If an attacker has access to an unlocked device, they likewise will have access to any data not protected by additional authentication. Under the direction of an administrator, remotely lock the device if it is suspected that the device has been left in an unlocked state in an unsecured location.

Restrict the use of OS and application synchronization services e. As support for this feature varies across OS versions, and restriction of synchronization can significantly impact device functionality, we did not choose to block synchronization.

Consider using MAM policies to restrict the data-sharing functions accessible to managed applications. Verify digital signatures on applications to ensure that only applications from trusted entities are installed on the device and that code has not been modified.

Each of the mobile device OSes used supports verification of digital signatures for applications and application and OS updates. Additionally, SCCM incorporates this information with its centralized asset inventory.

When configuring an MDM policy in SCCM, if the noncompliance severity for reports setting for a given policy section is set to critical with event, then in addition to logging by Configuration Manager, a Windows event will be generated, enabling additional notification features by using Event Viewer. Note: Use of OS-managed secure key storage by any given application is optional. Intune and SCCM offer a policy setting that restricts enrolled devices to installing applications from the official application store for its OS.

Note that blocking the installation of third-party applications is currently incompatible with the use of an organization-managed application store. Intune has MAM functionality that allows it to automatically install, update may require manual deployment , and remove applications from managed devices. Access to the policies and software functions that will install, upgrade, or remove applications from managed devices is managed by a role-based access management scheme using AD groups.

The SCCM built-in role of Application Deployment Manager can be used to manage which administrators can install and remove applications from managed devices. Intune and SCCM receive application information from Company Portal; the installed applications with version information are inventoried for each device. Intune and SCCM have MAM functionality that allows an organization to upload internally developed and publicly available applications to a private application store accessible only to managed devices.

Data is accessible only to authorized users and services. Data is protected during storage and processing. The confidentiality and integrity of information is protected while in transit SC-8 by using a cryptographic mechanism. Monitor and control communications at the external boundary of the system and at key internal boundaries within the system. DS Integrity-checking mechanisms are used to verify software, firmware, and information integrity.

Malicious code protection is installed on mobile devices. Only mission-appropriate content may be uploaded within the application. Scanning mechanisms are implemented and effective.

Vulnerability scanners provide comprehensive coverage and employ best practices. The architecture accounts for multiple user roles with access privileges assigned to each role. Microsoft, How to create and assign app protection policies , Microsoft Technet, Nov. Microsoft, Windows Phone 8. Lookout, Change to sideloading apps in iOS 9 is a security win.

Google, Help protect against harmful apps with Google Play Protect. Microsoft, Windows Phone Library , Apr. Operating system OS -level capability provided by each mobile OS, often a combination of full disk encryption and file-level encryption. Application-level encryption: potential additional layer of cryptographic protection on managed application data. Due to variations in implementation of encryption on mobile devices, per-application encryption may only provide additional protection over device encryption for certain devices in certain states e.

Trusted key storage: protected locations in software, firmware, or hardware in which long-term cryptographic keys can be held. Android not in use: Android Keystore. The underlying implementation is device-specific but is typically backed by firmware or hardware capabilities to securely store keys and perform cryptographic operations iOS: provided by Secure Enclave Windows Phone: has a Trusted Platform Module TPM capable of trusted key storage [35].

Protected communications: The confidentiality of data transmitted over untrusted networks is protected by strong encryption. Communication between mobile devices, cloud services, and on-premises components are protected by Transport Layer Security. Unauthorized access to personal and corporate data when an attacker is suspected of having physical access to a lost or stolen device.

Selective wipe: Render access to enterprise data stored on a device infeasible without affecting personal data. Unauthorized access to enterprise data when a managed device is under the control of an untrusted user, but destruction of personal data is undesirable Accidental disclosure of corporate data that may be accessible to personal applications once the user has opted to unenroll their personal device from enterprise management.

Unauthorized access to personal and corporate data when an attacker attempts brute-force attacks against the unlock mechanism for a lost or stolen device. Hardware security modules: tamper-resistant hardware used to perform cryptographic operations and secure storage that may be removable or physically part of the device.

Android: Device implementation specific, may be discrete hardware, or may be implemented in firmware e. Sandboxing: OS or application-level mechanisms utilizing multiple protection, isolation, and integrity capabilities to achieve higher levels of overall isolation.

Exploitation of vulnerabilities in standard-process isolation mechanisms that would allow a process to access the instructions or data stored in the memory space or storage locations of another process Exploitation of vulnerabilities in the OS by compromised or malicious mobile applications Loss of availability of some OS functionality by flawed mobile applications that enter an unrecoverable execution state e.

Trusted execution: A process is created and runs in a trustworthy and isolated execution environment leveraging distinct memory spaces and controlled interfaces. Exploitation of vulnerabilities in standard-process isolation mechanisms in which the attacking and target processes run in the same security context. Compromise of the mobile OS via exploits delivered over unused wireless communications protocols e. Data flow control: application-level access policies on OS-provided functionality that would transfer data into or out of its control.

Loss of confidentiality of and enterprise control over enterprise data that can be shared between mobile applications. Installation of mobile malware or PHAs, particularly repackaged versions of legitimate applications Exploitation of vulnerabilities in a third-party library e.



0コメント

  • 1000 / 1000