SlideShare une entreprise Scribd logo
1  sur  18
Class : 15/FA_CSCI_6638_81
Operating Systems Final Project
Professor Dr. Levine Gertrude
levine@fdu.edu
Team Members :
➔ Phanindra Veera (1691979)
veera1@student.fdu.edu
➔ Srilokh Moram ()
srilokh.morams@gmail.com
Table of contents
1. Introduction to mobile operating systems [4-7]
2. Software Architectures of Android and iOS [8-10]
3. Security Threats and Vulnerabilities [11-12]
4. Possible Solutions [13-14]
5. Conclusion [15]
Introduction to mobile operating systems
1. A mobile operating system is an operating system for mobile
devices such as Smartphones, Tablets and PDA’s.
1. A mobile OS combines the power of basic desktop functionality
facility along with cellular communications capability.
1. Examples :
Android, iOS, Blackberry, Windows Phone, Symbian etc..;
Most Popular Operating System
The most popular OS among Android and iOS can be easily decided
based on the factors:
1. Demographics (Market Share)
2. Number of Applications
3. Usage Statistics
Android or iOS ?
About 80% smartphones on earth runs on Android and It is obvious that
Android dominates iOS in all the above factors and this clearly states that
Android is the most popular mobile operating system in use.
Google’s Android Operating System
1. Based on Linux Kernel and completely
open source.
2. Founded by Andy Rubin, Rich Miner,
Nick Sears, Chris White in October
2003. Later Google bought Android inc.
for at least $50 million, in July 2005.
3. 11 Android OS versions were released
so far. and recent one is called as
“Android 6.0 (Marshmallow).”
Eric Schmidt, Andy Rubin and Hugo Barra at a 2012 press conference
announcing Google's Nexus 7 tablet.
Image Source : Wikipedia.org
Apple’s iOS
1. Apple was founded by Steve Jobs and
Steve Wozniak, and Ronald Wayne on
April 1, 1976.
2. iOS (iPhone OS), created and developed
by Apple Inc.
3. iOS serves as the mobile operating
system for Apple’s iPhone, iPad and
iPod Touch.
4. 9 iOS versions were released so far, the
recent one being called as “iOS 9”
Steve Jobs introducing iPhone during 2007 keynote
Image Source : Genius.com
Now let’s know about the software
architecture of both Android and
iOS.
Security Threats and Vulnerabilities
1. In July 2013, DHS reported that almost 79% of the malware threats affect
Android OS and only 19% affects the remaining OS such as iOS, Windows
Phone etc..;
2. Almost 45% of Android users worldwide are still using earlier versions of
Android OS that contains vulnerabilities which were fixed in later versions.
3. SMS Trojans, Fake App Stores, Third party app stores are a few other
threats that possess considerable risk to both user’s security and privacy.
Security Threats and Vulnerabilities
1. Rooting (Android) and Jailbreaking (iOS) are the processes that removes
software restrictions and gives complete privileges on device’s software
(Root/Admin access).
1. By performing these processes, users can also install applications/software
that the manufacturer wouldn't normally allow you to do so.
1. But implicitly, this may result in compromising user’s security credentials
and may leave the device vulnerable to more imminent threats, irrespective
of the operating system. So basically it’s like a two edged sword.
Possible Solutions
1. Install software updates regularly as soon as they are rolled out.
2. Stay away from 3rd party app stores.
3. Forget about rooting/jailbreaking.
4. In case of Android, try to avoid custom Android ROMs and the
devices that use custom ROMs other than Stock ROM (default
Android OS).
5. Use a reputed Anti-Malware software on the device.
So, who’s the winner? Android or iOS ?
1. When comes to the battle between Android and iOS in terms of security, Apple
iOS is the perfect winner. The reasons are :
2. According to various survey reports, as of now less than 25% iOS devices are
imminent to malware threats.
3. iOS devices always get timely security updates, which isn’t the case of Android
devices. Because Android has no centralized update system.
4. iOS isn’t open source as Android.
5. Privacy Control and Permissions are better on iOS when compared to Android.
Conclusion
So from the factors discussed in the last slide, It is
made clear that iOS is the most secure mobile
operating system than Android OS.
References
1) http://developer.android.com
2) http://developer.apple.com
3) http://www.howtogeek.com/224096/why-iphones-are-more-secure-than-android-
phones/
4) http://www.idc.com/prodserv/smartphone-os-market-share.jsp
5) http://searchmobilecomputing.techtarget.com/tip/Android-versus-iOS-security-
Features-policies-and-controls
6) https://www.veracode.com/resources/android-ios-security
Any Queries
Thank you….!

Contenu connexe

Tendances

Apple iOS Introduction
Apple iOS IntroductionApple iOS Introduction
Apple iOS IntroductionPratik Vyas
 
Process Management in Android
Process Management in AndroidProcess Management in Android
Process Management in AndroidShrey Verma
 
Android : Architecture & Components
Android : Architecture & ComponentsAndroid : Architecture & Components
Android : Architecture & ComponentsAkash Bisariya
 
Swift Tutorial For Beginners | Swift Programming Tutorial | IOS App Developme...
Swift Tutorial For Beginners | Swift Programming Tutorial | IOS App Developme...Swift Tutorial For Beginners | Swift Programming Tutorial | IOS App Developme...
Swift Tutorial For Beginners | Swift Programming Tutorial | IOS App Developme...Edureka!
 
Introduction To Mobile Application Development
Introduction To Mobile Application DevelopmentIntroduction To Mobile Application Development
Introduction To Mobile Application DevelopmentSyed Absar
 
Apple iOS - A modern way to mobile operating system
Apple iOS - A modern way to mobile operating systemApple iOS - A modern way to mobile operating system
Apple iOS - A modern way to mobile operating systemDhruv Patel
 
Introduction to iOS Apps Development
Introduction to iOS Apps DevelopmentIntroduction to iOS Apps Development
Introduction to iOS Apps DevelopmentProf. Erwin Globio
 
Android vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functionsAndroid vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functionsDipesh Bhatiya
 
Swift Programming Language
Swift Programming LanguageSwift Programming Language
Swift Programming LanguageCihad Horuzoğlu
 
History and development of Android OS
History and development of Android OSHistory and development of Android OS
History and development of Android OSusernameleon
 
Basic iOS Training with SWIFT - Part 1
Basic iOS Training with SWIFT - Part 1Basic iOS Training with SWIFT - Part 1
Basic iOS Training with SWIFT - Part 1Manoj Ellappan
 

Tendances (20)

Introduction to ios
Introduction to iosIntroduction to ios
Introduction to ios
 
Apple iOS Introduction
Apple iOS IntroductionApple iOS Introduction
Apple iOS Introduction
 
iOS Operating System
iOS Operating SystemiOS Operating System
iOS Operating System
 
Process Management in Android
Process Management in AndroidProcess Management in Android
Process Management in Android
 
Android : Architecture & Components
Android : Architecture & ComponentsAndroid : Architecture & Components
Android : Architecture & Components
 
Apple's ios
Apple's iosApple's ios
Apple's ios
 
Android Basic Concept
Android Basic Concept Android Basic Concept
Android Basic Concept
 
Swift Tutorial For Beginners | Swift Programming Tutorial | IOS App Developme...
Swift Tutorial For Beginners | Swift Programming Tutorial | IOS App Developme...Swift Tutorial For Beginners | Swift Programming Tutorial | IOS App Developme...
Swift Tutorial For Beginners | Swift Programming Tutorial | IOS App Developme...
 
Introduction To Mobile Application Development
Introduction To Mobile Application DevelopmentIntroduction To Mobile Application Development
Introduction To Mobile Application Development
 
Apple iOS - A modern way to mobile operating system
Apple iOS - A modern way to mobile operating systemApple iOS - A modern way to mobile operating system
Apple iOS - A modern way to mobile operating system
 
Introduction to iOS Apps Development
Introduction to iOS Apps DevelopmentIntroduction to iOS Apps Development
Introduction to iOS Apps Development
 
Android vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functionsAndroid vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functions
 
Swift Programming Language
Swift Programming LanguageSwift Programming Language
Swift Programming Language
 
Google chrome OS
Google chrome OSGoogle chrome OS
Google chrome OS
 
Android vs iOS
Android vs iOSAndroid vs iOS
Android vs iOS
 
Presentation on iOS
Presentation on iOSPresentation on iOS
Presentation on iOS
 
Android Operating System
Android Operating SystemAndroid Operating System
Android Operating System
 
History and development of Android OS
History and development of Android OSHistory and development of Android OS
History and development of Android OS
 
Basic iOS Training with SWIFT - Part 1
Basic iOS Training with SWIFT - Part 1Basic iOS Training with SWIFT - Part 1
Basic iOS Training with SWIFT - Part 1
 
Android ppt
Android pptAndroid ppt
Android ppt
 

En vedette

Android vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityAndroid vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityCloudCheckr
 
EMEA AppForum 2015 Android KitKat & Lollipop - new features for enterprise de...
EMEA AppForum 2015 Android KitKat & Lollipop - new features for enterprise de...EMEA AppForum 2015 Android KitKat & Lollipop - new features for enterprise de...
EMEA AppForum 2015 Android KitKat & Lollipop - new features for enterprise de...Pietro F. Maggi
 
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015Sina Manavi
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityNowSecure
 
The Art of defence: How vulnerabilites help shape security features and mitig...
The Art of defence: How vulnerabilites help shape security features and mitig...The Art of defence: How vulnerabilites help shape security features and mitig...
The Art of defence: How vulnerabilites help shape security features and mitig...Priyanka Aash
 
Android vs i os features
Android vs i os featuresAndroid vs i os features
Android vs i os featuresGuang Ying Yuan
 
How iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarHow iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarDenim Group
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
 
Android vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspectiveAndroid vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspectiveRaj Pratim Bhattacharya
 

En vedette (13)

Android vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityAndroid vs. iPhone for Mobile Security
Android vs. iPhone for Mobile Security
 
Android vs ios
Android vs iosAndroid vs ios
Android vs ios
 
EMEA AppForum 2015 Android KitKat & Lollipop - new features for enterprise de...
EMEA AppForum 2015 Android KitKat & Lollipop - new features for enterprise de...EMEA AppForum 2015 Android KitKat & Lollipop - new features for enterprise de...
EMEA AppForum 2015 Android KitKat & Lollipop - new features for enterprise de...
 
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app security
 
InfoSec World 2014 Security Imperatives for IOS and Android
InfoSec World 2014 Security Imperatives for IOS and AndroidInfoSec World 2014 Security Imperatives for IOS and Android
InfoSec World 2014 Security Imperatives for IOS and Android
 
Ios seminar
Ios seminarIos seminar
Ios seminar
 
The Art of defence: How vulnerabilites help shape security features and mitig...
The Art of defence: How vulnerabilites help shape security features and mitig...The Art of defence: How vulnerabilites help shape security features and mitig...
The Art of defence: How vulnerabilites help shape security features and mitig...
 
Android vs i os features
Android vs i os featuresAndroid vs i os features
Android vs i os features
 
Pitch
PitchPitch
Pitch
 
How iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarHow iOS and Android Handle Security Webinar
How iOS and Android Handle Security Webinar
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Android vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspectiveAndroid vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspective
 

Similaire à Android vs iOS security

Comparing Security- iOS vs Android.pdf
Comparing Security- iOS vs Android.pdfComparing Security- iOS vs Android.pdf
Comparing Security- iOS vs Android.pdfTechugo
 
Write a scholarly review on the following topic. This assignment i
Write a scholarly review on the following topic. This assignment iWrite a scholarly review on the following topic. This assignment i
Write a scholarly review on the following topic. This assignment ilorindajamieson
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systemsDivya Raval
 
Research on Comparative Study of Different Mobile Operating System_Part-1
Research on Comparative Study of Different Mobile Operating System_Part-1Research on Comparative Study of Different Mobile Operating System_Part-1
Research on Comparative Study of Different Mobile Operating System_Part-1Zulkar Naim
 
Penetration Testing for Android Smartphones
Penetration Testing for Android SmartphonesPenetration Testing for Android Smartphones
Penetration Testing for Android SmartphonesIOSR Journals
 
Dfc2043 operating system; open & closed source systems
Dfc2043 operating system; open & closed source systemsDfc2043 operating system; open & closed source systems
Dfc2043 operating system; open & closed source systemsFlameDimension95
 
A survey on android security: development and deployment hindrance and best p...
A survey on android security: development and deployment hindrance and best p...A survey on android security: development and deployment hindrance and best p...
A survey on android security: development and deployment hindrance and best p...TELKOMNIKA JOURNAL
 
Android OS - Simple pres.
Android OS - Simple pres.Android OS - Simple pres.
Android OS - Simple pres.Meqdad Darweesh
 
Android and iOS Platforms For E-Commerce App
Android and iOS Platforms For E-Commerce AppAndroid and iOS Platforms For E-Commerce App
Android and iOS Platforms For E-Commerce Appdigitalseller235
 
Malware Improvements in Android OS
Malware Improvements in Android OSMalware Improvements in Android OS
Malware Improvements in Android OSPranav Saini
 
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...AM Publications
 
Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...
Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...
Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...hlittle
 
Which mobile os should you choose while building
Which mobile os should you choose while buildingWhich mobile os should you choose while building
Which mobile os should you choose while buildingArpitGautam20
 
Android open-source operating System for mobile devices
Android open-source operating System for mobile devicesAndroid open-source operating System for mobile devices
Android open-source operating System for mobile devicesIOSR Journals
 
Android Vs Iphone
Android Vs IphoneAndroid Vs Iphone
Android Vs IphoneLucy Nader
 

Similaire à Android vs iOS security (20)

Comparing Security- iOS vs Android.pdf
Comparing Security- iOS vs Android.pdfComparing Security- iOS vs Android.pdf
Comparing Security- iOS vs Android.pdf
 
Write a scholarly review on the following topic. This assignment i
Write a scholarly review on the following topic. This assignment iWrite a scholarly review on the following topic. This assignment i
Write a scholarly review on the following topic. This assignment i
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systems
 
Research on Comparative Study of Different Mobile Operating System_Part-1
Research on Comparative Study of Different Mobile Operating System_Part-1Research on Comparative Study of Different Mobile Operating System_Part-1
Research on Comparative Study of Different Mobile Operating System_Part-1
 
Android security
Android securityAndroid security
Android security
 
Penetration Testing for Android Smartphones
Penetration Testing for Android SmartphonesPenetration Testing for Android Smartphones
Penetration Testing for Android Smartphones
 
OS-Project-Report-Team-8
OS-Project-Report-Team-8OS-Project-Report-Team-8
OS-Project-Report-Team-8
 
Android vs ios
Android vs iosAndroid vs ios
Android vs ios
 
Dfc2043 operating system; open & closed source systems
Dfc2043 operating system; open & closed source systemsDfc2043 operating system; open & closed source systems
Dfc2043 operating system; open & closed source systems
 
A survey on android security: development and deployment hindrance and best p...
A survey on android security: development and deployment hindrance and best p...A survey on android security: development and deployment hindrance and best p...
A survey on android security: development and deployment hindrance and best p...
 
Android OS - Simple pres.
Android OS - Simple pres.Android OS - Simple pres.
Android OS - Simple pres.
 
Android and iOS Platforms For E-Commerce App
Android and iOS Platforms For E-Commerce AppAndroid and iOS Platforms For E-Commerce App
Android and iOS Platforms For E-Commerce App
 
Malware Improvements in Android OS
Malware Improvements in Android OSMalware Improvements in Android OS
Malware Improvements in Android OS
 
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
 
Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...
Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...
Which Mobile OS is the Most Secure; Apple, Android or Windows? [Updated 2016-...
 
Which mobile os should you choose while building
Which mobile os should you choose while buildingWhich mobile os should you choose while building
Which mobile os should you choose while building
 
Android open-source operating System for mobile devices
Android open-source operating System for mobile devicesAndroid open-source operating System for mobile devices
Android open-source operating System for mobile devices
 
Android Vs Iphone
Android Vs IphoneAndroid Vs Iphone
Android Vs Iphone
 

Dernier

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Dernier (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Android vs iOS security

  • 1. Class : 15/FA_CSCI_6638_81 Operating Systems Final Project Professor Dr. Levine Gertrude levine@fdu.edu Team Members : ➔ Phanindra Veera (1691979) veera1@student.fdu.edu ➔ Srilokh Moram () srilokh.morams@gmail.com
  • 2.
  • 3. Table of contents 1. Introduction to mobile operating systems [4-7] 2. Software Architectures of Android and iOS [8-10] 3. Security Threats and Vulnerabilities [11-12] 4. Possible Solutions [13-14] 5. Conclusion [15]
  • 4. Introduction to mobile operating systems 1. A mobile operating system is an operating system for mobile devices such as Smartphones, Tablets and PDA’s. 1. A mobile OS combines the power of basic desktop functionality facility along with cellular communications capability. 1. Examples : Android, iOS, Blackberry, Windows Phone, Symbian etc..;
  • 5. Most Popular Operating System The most popular OS among Android and iOS can be easily decided based on the factors: 1. Demographics (Market Share) 2. Number of Applications 3. Usage Statistics Android or iOS ? About 80% smartphones on earth runs on Android and It is obvious that Android dominates iOS in all the above factors and this clearly states that Android is the most popular mobile operating system in use.
  • 6. Google’s Android Operating System 1. Based on Linux Kernel and completely open source. 2. Founded by Andy Rubin, Rich Miner, Nick Sears, Chris White in October 2003. Later Google bought Android inc. for at least $50 million, in July 2005. 3. 11 Android OS versions were released so far. and recent one is called as “Android 6.0 (Marshmallow).” Eric Schmidt, Andy Rubin and Hugo Barra at a 2012 press conference announcing Google's Nexus 7 tablet. Image Source : Wikipedia.org
  • 7. Apple’s iOS 1. Apple was founded by Steve Jobs and Steve Wozniak, and Ronald Wayne on April 1, 1976. 2. iOS (iPhone OS), created and developed by Apple Inc. 3. iOS serves as the mobile operating system for Apple’s iPhone, iPad and iPod Touch. 4. 9 iOS versions were released so far, the recent one being called as “iOS 9” Steve Jobs introducing iPhone during 2007 keynote Image Source : Genius.com
  • 8.
  • 9. Now let’s know about the software architecture of both Android and iOS.
  • 10.
  • 11.
  • 12. Security Threats and Vulnerabilities 1. In July 2013, DHS reported that almost 79% of the malware threats affect Android OS and only 19% affects the remaining OS such as iOS, Windows Phone etc..; 2. Almost 45% of Android users worldwide are still using earlier versions of Android OS that contains vulnerabilities which were fixed in later versions. 3. SMS Trojans, Fake App Stores, Third party app stores are a few other threats that possess considerable risk to both user’s security and privacy.
  • 13. Security Threats and Vulnerabilities 1. Rooting (Android) and Jailbreaking (iOS) are the processes that removes software restrictions and gives complete privileges on device’s software (Root/Admin access). 1. By performing these processes, users can also install applications/software that the manufacturer wouldn't normally allow you to do so. 1. But implicitly, this may result in compromising user’s security credentials and may leave the device vulnerable to more imminent threats, irrespective of the operating system. So basically it’s like a two edged sword.
  • 14. Possible Solutions 1. Install software updates regularly as soon as they are rolled out. 2. Stay away from 3rd party app stores. 3. Forget about rooting/jailbreaking. 4. In case of Android, try to avoid custom Android ROMs and the devices that use custom ROMs other than Stock ROM (default Android OS). 5. Use a reputed Anti-Malware software on the device.
  • 15. So, who’s the winner? Android or iOS ? 1. When comes to the battle between Android and iOS in terms of security, Apple iOS is the perfect winner. The reasons are : 2. According to various survey reports, as of now less than 25% iOS devices are imminent to malware threats. 3. iOS devices always get timely security updates, which isn’t the case of Android devices. Because Android has no centralized update system. 4. iOS isn’t open source as Android. 5. Privacy Control and Permissions are better on iOS when compared to Android.
  • 16. Conclusion So from the factors discussed in the last slide, It is made clear that iOS is the most secure mobile operating system than Android OS.
  • 17. References 1) http://developer.android.com 2) http://developer.apple.com 3) http://www.howtogeek.com/224096/why-iphones-are-more-secure-than-android- phones/ 4) http://www.idc.com/prodserv/smartphone-os-market-share.jsp 5) http://searchmobilecomputing.techtarget.com/tip/Android-versus-iOS-security- Features-policies-and-controls 6) https://www.veracode.com/resources/android-ios-security