Comparative Analysis: Mobile OS Security Vulnerabilities and Solutions

Verified

Added on  2022/11/13

|4
|793
|214
Report
AI Summary
This report examines the security vulnerabilities of Android and iOS operating systems. It highlights specific threats such as SOP, GinMaster, and Master Key in Android, and trust jacking in iOS. The report discusses the open-source nature of Android and the closed ecosystem of iOS, and how these factors impact security. It mentions the use of antivirus software and open-source initiatives for Android security, and SSL for iOS. The analysis concludes that iOS, with its restricted API access, offers a more secure environment compared to Android. The report is based on the provided articles from various sources, including articles and reports from Threatpost, Juniper Networks, ZDNet, Lookout Mobile Security, and McAfee.
Document Page
Running head: - SECURITY VUILNERABILITIES AND ITS SOLUTION
DIFFERENT MOBILE OS AND ITS SECURITY ISSUES
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1SECURITY VUILNERABILITIES AND ITS SOLUTION
The invention of the mobile phones has changed the communication process and also
increased its utility. The mobile phones are small in size and performs different types of
functions which helps in improving the standard of living. The mobile devices stores different
information which need to be protected. All the data need to be protected and the users must
be aware of the security issues and must know the different methods to counter the threats
(Ahmad et al., 2013). The mobile devices uses different operating system. The following
discussion will focus upon two different operating system used in the mobile devices. The
two different OS is Android OS and the Apple iOS.
The Android is based on Linux which is an open source OS. The Android is
maintained by the Google. The current version which the OS is using is 6. It is one of the
most widely used operating system. The device operating on the Android OS uses the
combination of the proprietary software and the open source. The Android OS faces different
security vulnerabilities such as the SOP, GinMaster, and Master Key (Li Clark, 2013). The
threat is faced by the Android browser which allows the hackers to avoid the SOP. The
hackers can easily access the important information of the users. The action is performed
when the hackers send a malformed JavaScript. The GinMaster is also a threats in which the
malware helps in stealing the information details and gives the access to install different
application in the device without the users’ permission. When a newly installed application
does not break the cryptography key the virus is introduced in the system.
There are certain key security programs that helps in resolving the vulnerabilities.
There are different antivirus which is installed in the device which protects it from the
security vulnerability. An open source is created by the Google which helps in maintaining its
security.
Document Page
2SECURITY VUILNERABILITIES AND ITS SOLUTION
The iOS operates only in the Apple devices. The tool provided by the Apple can only
be used in the MAC operating system. The device is only able to install the application which
have been signed by the Apple and its operating system. The security vulnerability faced by
the Apple iOS is the trust jacking. When the iOS is connected with the computer the user is
able to access all the information without any further permission from the owner of the
information. The hackers does not require any permission from the user and gets the
authorization to all the information (Mohamed & Patel, 2015). The security vulnerability can
be prevented with the installation of the SSL. The SSL is the secure security lock which helps
in securing all the information stored in the Apple. It gives full protection to the stored
information in the device.
It can be concluded that the Apple iOS has more secure system compared to the
Android OS. The reason is that the Apple does not make the API available to the different
developers. It reduces the number of hackers (Werthmann et al., 2013). However the Apple
iOS is more secure and less vulnerable.
Document Page
3SECURITY VUILNERABILITIES AND ITS SOLUTION
References
Ahmad, M. S., Musa, N. E., Nadarajah, R., Hassan, R., & Othman, N. E. (2013, July).
Comparison between android and iOS Operating System in terms of security. In 2013
8th International Conference on Information Technology in Asia (CITA) (pp. 1-4).
IEEE.
Li, Q., & Clark, G. (2013). Mobile security: A look ahead. IEEE Security & Privacy, 11(1),
78-81.
Mohamed, I. & Patel, D. (2015, April). Android vs iOS security: A comparative study.
In 2015 12th International Conference on Information Technology-New
Generations (pp. 725-730). IEEE.
Werthmann, T., Hund, R., Davi, L., Sadeghi, A. R., & Holz, T. (2013, May). PSiOS: bring
your own privacy & security to iOS devices. In Proceedings of the 8th ACM SIGSAC
symposium on Information, computer and communications security (pp. 13-24).
ACM.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]