This article discusses the security vulnerabilities faced by Android and iOS operating systems in mobile devices and the methods to counter the threats. It compares the security features of Android and iOS and concludes that iOS is more secure and less vulnerable.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: - SECURITY VUILNERABILITIES AND ITS SOLUTION DIFFERENT MOBILE OS AND ITS SECURITY ISSUES Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1SECURITY VUILNERABILITIES AND ITS SOLUTION The invention of the mobile phones has changed the communication process and also increased its utility. The mobile phones are small in size and performs different types of functions which helps in improving the standard of living. The mobile devices stores different information which need to be protected. All the data need to be protected and the users must be aware of the security issues and must know the different methods to counter the threats (Ahmadet al.,2013). The mobile devices uses different operating system. The following discussion will focus upon two different operating system used in the mobile devices. The two different OS is Android OS and the Apple iOS. The Android is based on Linux which is an open source OS. The Android is maintained by the Google. The current version which the OS is using is 6. It is one of the most widely used operating system. The device operating on the Android OS uses the combination of the proprietary software and the open source. The Android OS faces different security vulnerabilities such as the SOP, GinMaster, and Master Key (Li Clark, 2013). The threat is faced by the Android browser which allows the hackers to avoid the SOP. The hackers can easily access the important information of the users. The action is performed when the hackers send a malformed JavaScript. The GinMaster is also a threats in which the malware helps in stealing the information details and gives the access to install different application in the device without the users’ permission. When a newly installed application does not break the cryptography key the virus is introduced in the system. There are certain key security programs that helps in resolving the vulnerabilities. There are different antivirus which is installed in the device which protects it from the security vulnerability. An open source is created by the Google which helps in maintaining its security.
2SECURITY VUILNERABILITIES AND ITS SOLUTION The iOS operates only in the Apple devices. The tool provided by the Apple can only be used in the MAC operating system. The device is only able to install the application which have been signed by the Apple and its operating system. The security vulnerability faced by the Apple iOS is the trust jacking. When the iOS is connected with the computer the user is able to access all the information without any further permission from the owner of the information. The hackers does not require any permission from the user and gets the authorization to all the information (Mohamed & Patel, 2015). The security vulnerability can be prevented with the installation of the SSL. The SSL is the secure security lock which helps in securing all the information stored in the Apple. It gives full protection to the stored information in the device. It can be concluded that the Apple iOS has more secure system compared to the Android OS. The reason is that the Apple does not make the API available to the different developers. It reduces the number of hackers (Werthmann et al., 2013). However the Apple iOS is more secure and less vulnerable.
3SECURITY VUILNERABILITIES AND ITS SOLUTION References Ahmad, M. S., Musa, N. E., Nadarajah, R., Hassan, R., & Othman, N. E. (2013, July). Comparison between android and iOS Operating System in terms of security. In2013 8th International Conference on Information Technology in Asia (CITA)(pp. 1-4). IEEE. Li, Q., & Clark, G. (2013). Mobile security: A look ahead.IEEE Security & Privacy,11(1), 78-81. Mohamed, I. & Patel, D. (2015, April). Android vs iOS security: A comparative study. In201512thInternationalConferenceonInformationTechnology-New Generations(pp. 725-730). IEEE. Werthmann, T., Hund, R., Davi, L., Sadeghi, A. R.,& Holz, T. (2013, May). PSiOS: bring your own privacy & security to iOS devices. InProceedings of the 8th ACM SIGSAC symposiumon Information,computerand communicationssecurity(pp. 13-24). ACM.