describe how Apple protects the Apple Store define malware, exploitation, and compare Mac OS threats versus iOS threats describe reduced attack surface and stripped-down iOS describe code signing, return-oriented programming (ROP), and data execution prevention describe privilege separation, address space layout randomization, and sandboxing describe data protection API and class