logo

Operating System Security: Best security practices for securing mobile operating systems

   

Added on  2023-06-13

10 Pages2449 Words490 Views
Running head: OPERATING SYSTEM SECURITY
Operating System Security: Best security practices for securing mobile operating systems
Name of the student:
Name of the university:

1OPERATING SYSTEM SECURITY
Introduction
This research report depicts the crucial necessity of security and privacy of mobile
operating system to keep the confidential information secured from unauthenticated externals.
Mobile operating system has high level build in security characteristics which can significantly
minimize the impact and frequency of the application security level issues. This particular
system is designed and modeled to ensure that the users can build the security app along with the
default system as well as the file permission. It helps to avoid different difficult decisions about
the operating system security. Besides
1.1 Aim
The aim of the research report is to identify different high level security and privacy
practices those are necessary for the OS developers to consider before its final application.
Different security tools and technologies are there that may help to avoid system threats, attack
trends and related statistics. Another aim of the research report is to identify the social, ethical
and legal issues associated to Mobile operating system.
1.2 Objectives
To identify all security level issues that may interrupt the running application of
mobile operating system
To investigate the security tools and policies those are helpful to mitigate the
operational issues of mobile OS
To examine and discuss all related standard industry level practices

2OPERATING SYSTEM SECURITY
2. Best security practices for securing mobile operating systems
2.1 Different Mobile Operating systems
Based on the model details and application level features of the mobile phones the best
suited Mobile Operating Systems (OS) is considered. Among the available mobile operating
systems some of the OS are elaborated below:
iOS: Only for the Apple devices such as iphone this iOS operating system is used. Over
last few years the market share of the iOS is growing rapidly and reached up to 16% (Mutchler et
al. 2015). The iOS operating system is consists of core OS, core services and media. The service
of iOS is comprises of high level framework that are used for the graphics, videotechnologies
etc.
Android: Google and Open Handset alliance has combiningly developed the Android
operating system. The market usability implies that android is the second widely used OS that is
comprises of Linux Kernel, using C and C++ coding open source Library, application framework
(Turland et al. 2015).
Apart from iOS and Android, windows blackberry OS are used for windows phone and
blackberry mobile phones respectively (Chen et al. 2016). Security is the most important aspect
that has to be considered for any mobile device to keep their data secured from the external
attackers.
2.2 Different security practices for securing mobile operating systems
In order to secure the mobile operating system, different security practices and policies
are available in the market those are strictly needed to be adopted and maintained by the system
developers. According to Abirami and Venkataraman (2016), it has already been established

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Operating System of Android Phones
|4
|808
|198

Comparison of Security in Mobile Operating Systems
|9
|2300
|438

Smartphone Operating System and Security: A Comparative Study
|7
|1257
|77

Comparison of Operating Systems
|7
|1695
|237

Different Mobile OS and its Security Issues
|4
|793
|214

A Study on Mobile Application Vulnerabilities and Mobile Application Security Best Practices
|10
|2588
|407