Specifications

How the BlackBerry 10 device prevents the exploitation of memory corruption ................................................................ 110
14 The BlackBerry PlayBook OS ....................................................................................................... 112
The BlackBerry PlayBook tablet file system ..................................................................................................................... 112
How the BlackBerry PlayBook OS uses sandboxing to protect app data ........................................................................... 113
How the BlackBerry PlayBook OS manages the resources on a tablet .............................................................................. 113
How the BlackBerry PlayBook tablet manages permissions for apps ................................................................................ 114
How the BlackBerry PlayBook tablet verifies the software that it runs .............................................................................. 114
How the BlackBerry PlayBook tablet verifies the boot ROM code .............................................................................. 114
How the BlackBerry PlayBook tablet verifies the BlackBerry PlayBook OS and its file system .................................... 114
How the BlackBerry PlayBook tablet verifies apps and software upgrades ................................................................. 115
How the BlackBerry PlayBook tablet prevents the exploitation of memory corruption ....................................................... 115
15 Protecting the data that the BlackBerry Device Service stores in your organization's environment
................................................................................................................................................... 117
Data that the BlackBerry Configuration Database stores ................................................................................................. 117
Best practice: Protecting the data that the BlackBerry Configuration Database stores ..................................................... 118
16 Cryptographic algorithms, codes, protocols, and libraries that devices support ............................. 120
Symmetric encryption algorithms ................................................................................................................................... 120
Asymmetric encryption algorithms .................................................................................................................................. 121
Hash algorithms ............................................................................................................................................................. 121
Message authentication codes ....................................................................................................................................... 122
Signature algorithms ...................................................................................................................................................... 122
Key agreement algorithms .............................................................................................................................................. 123
Cryptographic protocols ................................................................................................................................................. 123
Internet security protocols ....................................................................................................................................... 123
VPN security protocols ............................................................................................................................................. 123
Wi-Fi security protocols ............................................................................................................................................ 123
Cipher suites that a device supports for opening SSL/TLS connections ............................................................................. 124
Cryptographic Libraries .................................................................................................................................................. 126
VPN cryptographic support ............................................................................................................................................. 126
Wi-Fi cryptographic support ............................................................................................................................................ 126
17
Product documentation .............................................................................................................. 128
18 Glossary ...................................................................................................................................... 131
19 Legal notice ................................................................................................................................ 136