Apple iPad Air
From Wiki-IoT
Classification
Apple iPad Air | |
---|---|
Classification | |
Grade | A |
Calculator version | [[:Category:Calculator v|]] |
Classification date | |
Information | |
Name | Apple iPad Air (6th generation) |
Brand by Parent | Apple by Apple Inc. |
Generation | 6th generation |
Model(s) | A2838, A2880, A2881, A2882 (Wi-Fi & Cellular models) |
Release date | 2024-05-01 |
Type/Category | Tablet Computer |
Website | [1] |
Status | In sale |
More | |
Dimensions | 247.6 mm x 178.5 mm x 6.1 mm |
Mass | 462 g (Wi-Fi model), 477 g (Cellular model) |
Operating system | iPadOS 17 |
Companion App | App Store, Apple Configurator (for IT) |
CPU | Apple M2 chip (8-core CPU) |
GPU | Apple M2 chip (10-core GPU) |
Memory | 8GB RAM |
Storage | 128GB, 256GB, 512GB, 1TB |
Battery | Built-in 28.93-watt-hour rechargeable lithium-polymer battery |
Power | 20W USB-C Power Adapter (included) |
Charging | USB-C |
Display | 11-inch or 12.9-inch Liquid Retina display, 264 PPI |
Camera | 12MP Wide camera (rear), 12MP Ultra Wide camera (front, Center Stage) |
Sound | Stereo landscape speakers |
Connectivity | Wi-Fi 6E, Bluetooth 5.3, 5G (Cellular models), USB-C (USB 3.1 Gen 2) |
Device | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Known hardware tampering | Rare | [2] | Device is tightly sealed. Repairs are difficult and may trigger system integrity protections. |
Known vulnerabilities | Rare | [3] | Apple provides regular security updates for iPadOS for many years after release. |
Prior attacks | Rare | [4] | Targeted spyware attacks exist but are not common for general users. |
Updatability | Very common | [5] | Receives frequent and long-term iPadOS updates directly from Apple. |
Category score | 2 |
System | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Authentication with other systems | Full | [6] | Deeply integrated with iCloud and Apple ID for seamless cross-device functionality. |
Communications | Encrypted with up-to-date encryption | [7] | iMessage, FaceTime, and iCloud data use end-to-end encryption. |
Storage | Encrypted with up-to-date encryption | [8] | Features hardware-accelerated AES encryption and a Secure Enclave for data protection. |
Category score | 1 |
User Authentication | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Account management | Full | [9] | An Apple ID is required for core functionality, managed through Apple's ecosystem. |
Authentication | Secure | [10] | Supports strong methods like Touch ID (in top button) and device passcode. |
Brute-force protection | Exist | [] | Increasing time delays are enforced after failed passcode attempts. |
Event logging | Access event logged | [11] | Login and significant access events can be monitored with managed accounts. |
Passwords | Require change after setup with complexity requirements | [12] | Encourages strong passcodes and supports complex passwords for device unlock. |
Category score | 1 |
Grade | A |
---|