Computerworld - I have seen the future of home computing, and it is the iPad. I'm convinced of it.
Yes, iPadurday has come and gone. Many of us have Wi-Fi iPads in our grubby little mitts. Early reviews have been mostly stellar. The device -- and more importantly, the software running it -- is superb, but certainly not perfect. And now we've seen Steve Jobs outline the next release of the operating system, iPhone OS 4.0. That's all well and good, but largely secondary to my point.
When I got my iPad, I immediately installed several software packages on it. Most of it was for entertainment (e.g., Netflix, ABC Reader), but I also installed a couple of apps that could at least ostensibly be used for business (e.g., Pages, Keynote). Each installation was simple: I ran the App Store application, found the tools I wanted, and clicked the purchase icon. Within moments, each package installed.
The installation process gave me absolutely no choice as far as where the software would reside on my iPad. In fact, I had no choices whatsoever beyond yes/no to purchase the apps.
Once the apps were installed, I was able to get some of my Keynote presentations and Pages documents over to my iPad via an iTunes synchronization to my MacBook Pro. (The need to do it that way is a separate topic, discussed below.) But here too, I had absolutely no way of controlling or choosing where the documents were placed on the iPad. Once I synchronized the device, the documents appeared for their respective applications.
For many of my fellow techies, the words "lack of choice" are the kiss of death for a device like this. But for the average consumer, "lack of choice" can be interpreted as "simple," by and large. And to get to the masses, simple never hurts.
So, what are the security ramifications here? Well, for one thing, there is no direct access to the file system without installing an app that gives you (limited) access to the iPad's file system. Yes, there are ways to "jailbreak" your iPad and get to the underlying file system, but short of some malware doing that "for" them, that's not something you'd find any consumers doing.
The apps themselves are at least somewhat sandboxed from one another. Data from one application isn't generally available to other applications. And application storage can't -- again, in the absence of jailbreaking -- be overwritten by another application.
Kenneth van Wyk
- Kenneth van Wyk: Apple's big fail
- Kenneth van Wyk: After Snowden
- Kenneth van Wyk: Target breach underscores how backward U.S. payment tech is
- Kenneth van Wyk: Enjoy your trip, but protect the data you take with you
- Kenneth van Wyk: Lingering faults with security by default
- Kenneth van Wyk: High hopes for iPhone's Touch ID
- Kenneth van Wyk: Why mobile apps beat Web apps for privacy
- Bug bounties: Bad dog! Have a treat!
- How to avoid Big Brother's gaze
- The true root causes of software security failures
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts