Abstract
They have accounts and credentials, but no role-based access, and there are generally only two permission types: user and root. In addition, there is typically only one account and the operating system does not provide provisions for more than one user account as a part of its design.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Morey J. Haber and Brad Hibbert
About this chapter
Cite this chapter
Haber, M.J., Hibbert, B. (2018). Mobile Devices. In: Privileged Attack Vectors. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3048-0_16
Download citation
DOI: https://doi.org/10.1007/978-1-4842-3048-0_16
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-3047-3
Online ISBN: 978-1-4842-3048-0
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books