IOS VS ANDROID Presented by, Lowkya Pothineni.

Slides:



Advertisements
Similar presentations
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Advertisements

6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
1 Alcatel Onetouch Antivirus. 2 Thinking about security on your smartphone Alcatel OneTouch? We have the solution. Among the applications on your smartphone,
Vivek-Vijayan University of Tennessee at Chattanooga.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Chung Man Ho Willims Chow Man Kei Gary Kwok Pak Wai Lion.
BY MUKTADIUR RAHMAN DATE: JUNE 10, 2010 Introduction to iPhone SDK.
Xuan Guo Chapter 1 What is UNIX? Graham Glass and King Ables, UNIX for Programmers and Users, Third Edition, Pearson Prentice Hall, 2003 Original Notes.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access memory.
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
An Introduction to Operating Systems. Definition  An Operating System, or OS, is low-level software that enables a user and higher-level application.
Case study 2 Android – Mobile OS.
Security issues for mobile devices Cvetko Andreeski.
IOS & Android Security, Hacking and Tweaking Workshop D.Papamartzivanos University Of the Aegean – Info Sec Lab Android Security – Cydia Substrate Dimitris.
Emerging Platform#4: Android Bina Ramamurthy.  Android is an Operating system.  Android is an emerging platform for mobile devices.  Initially developed.
CS 153 Design of Operating Systems Spring 2015 Lecture 24: Android OS.
Operating Systems Chapter 4.
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Chapter 3.1:Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
PowerPoint Presentation to Accompany Chapter 5 System Software Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall.
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
Computer and Information Sciences
CS 1308 Computer Literacy and the Internet. Introduction  Von Neumann computer  “Naked machine”  Hardware without any helpful user-oriented features.
Mobile Device Security
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Lecture 2 Title: Computer Software By: Mr Hashem Alaidaros MIS 101.
Your Interactive Guide to the Digital World Discovering Computers 2012.
INVITATION TO COMPUTER SCIENCE, JAVA VERSION, THIRD EDITION Chapter 6: An Introduction to System Software and Virtual Machines.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
INFO 320 Server Technology I Week 1 Server operating system and hardware concepts 1INFO 320 week 1.
Folio3 IPhone Training Session 1 Presenter: Imam Raza.
Visualizing Technology© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation To Accompany Chapter 6 System Software.
Android Security Auditing Slides and projects at samsclass.info.
ANDROID BY:-AANCHAL MEHTA MNW-880-2K11. Introduction to Android Open software platform for mobile development A complete stack – OS, Middleware, Applications.
Android System Security Xinming Ou. Android System Basics An open-source operating system for mobile devices (AOSP, led by Google) – Consists of a base.
 Android OS: Java  iOS: Objective C NSArray * foo = [[NSArray alloc]
Wireless and Mobile Security
Dilip Dwarakanath.  The topic I’m about to present was taken from a paper titled “Apple iOS 4 Security Evaluation” written by Dino A Dai Zovi.  Dino.
Your Interactive Guide to the Digital World Discovering Computers 2012.
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
TCS Internal Security. 2 TCS Internal Objective Objective :  Android Platform Security Architecture.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
Analysis And Research Of System Security Based On.
By: Collin Molnar. Overview  Intro to Android  Security basics  Android architecture  Application isolation  Application permissions  Physical access.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Android and IOS Permissions Why are they here and what do they want from me?
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Module 51 (Mobile Device Fundamentals - Android)
Computer System Structures
4.4.1 The Operating System.
Chapter 4: Operating System Basics
Lecture 1-Part 2: Operating-System Structures
Understanding Android Security
Chapter 2: Operating-System Structures
SOFTWARE DEVELOPMENT KIT-ios and Blackberry
Who owns your phone? Who feels that they have the right to use your phone for their purposes or on your behalf?
Contents: Introduction Different Mobile Operating Systems
What is an Operating System?
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Understanding Android Security
Emerging Platform#3 Android & Programming an App
Presentation transcript:

IOS VS ANDROID Presented by, Lowkya Pothineni

CONTENTS INTRODUCTION SECURITY REQUIREMENTS FOR MOS APPLICATION SANDBOXING MEMORY RANDOMIZATION ENCRYPTION DISK STORAGE FORMAT BUILT-IN ANTIVIRUS COMPARISION OF SECURITY IN MOS CONCLUSION REFERENCES

INTRODUCTION ANDROID OS: A Mobile Operating System(MOS) developed by Google. Open source Based on linux kernal Programming used- JAVA, XML,PYTHON iPhone OS(iOS): A Mobile Operating System developed by Apple.Inc Derived from Mac OS X Unix-like OS and has Hybrid Kernal architecture Programming used-C,C++,Objective-C

Layers of Ios:

Layers of iOS: Core OS-Provides low level network access to external accessories .Manages memory, file system, threads. Core Services-Contains fundamental system services used by all the applications. Media Services-Contains graphics, audio, video technologies providing best multimedia experience. Cocoa Touch-Contains key framework for building applications. Supports multi-tasking, push notifications, touch-based input and high level system services.

SECURITY REQUIREMENT FOR MOS Todays Mobile OS provides certain security mechanisms. Permissions and entitlements are assigned at the time of creation of applications. Cannot be changed dynamically. APPLICATION SANDBOXING: A container which isolates the applications and code execution from other apps(malicious code and virus). Improves the security by assigning unique id to applications. In ANDROID: Complex and Robust structure. Each app has its own sandbox directory. Each app has specific accessing permissions.

In iOS: Robust structure Fine-grained control limiting access to network, file system and hardware. One sandbox model shared by all the applications. iOS provides more security than Android in terms of Application Sandboxing. It allows access to root system file and phone settings. In Android user sets the security at installation time.

MEMORY RANDOMIZATION(MR) Also called Address Space Layout Randomization(ASLR). Random allocations of memory Hence, difficult to find the exact memory locations of task that s to be attacked. In ANDROID Jelly Bean version of Android follows MR. In iOS: MR is applied since iOS 4.3. Follows Code-signing technology-process to validate the third party applications Apple issued certificate Prevents loading of unsigned code resources. Hence, IOS is more secured than Android.

ENCRYPTION: Process of converting the plain text to cipher text(unreadable format) using a secret key or password. Decrypted to plain text using that key. In ANDROID: Encryption is introduced from “Ice cream Sandwhich 4.0”. Based on dm-encrypt(Disk encryption). In iOS: Hardware encryption-iPhone 3GS. More robust than Android. Passcode is required to read the encrypted file. Although the encrypted data can be stored in the form of plain text it can be accessible only by knowing the encryption keys even by the developers.

DATA STORAGE FORMAT: Data is stored in either inbuilt or external storage. In ANDROID: Can use both external and internal storage. Applications have read access to all the files. Encryption keys can be found by the unwanted code with root access. Spreading of malware directly to the storage. In iOS: Only internal storage. Requires permissions to access the data. Additional layer of data protection(data protection API’s + passphrase). Hence, iOS is more secure than Android making difficult access to data storage.

BUILT-IN ANTIVIRUS: Prevents malware such as Virus: True piece of malicious software which destroys the system resources. Spyware: Gathers user information without their knowledge. Trojan: Non-self replicating virus, serves a desired function and leads to data loss. In ANDROID: No pre-installed antivirus features. Should be downloaded from google play(outside web source). Much prone to malware effects. In iOS: Doesn’t need any antivirus program, since apple doesn’t allow installation from outside source. Gets Apps from App store which is checked rigorously. iOS is less likely to virus attacks than the open source, social network Android OS.

COMPARISION OF SECURITY IN MOS FEATURES ANDROID iOS Application Sandboxing Each app has its own sandbox directory. All the apps share the same sandbox. Memory Randomization Applied from jelly bean version. Applied since iOS 4.3 with code-signing technology. Encryption Introduced disk encryption from Ice cream Sandwhich 4.0 Hardware encryption. Data storage format External storage and accessible by unwanted code. No external storage and an additional layer of protection Built-in antivirus Downloaded from outside source and much prone to malware. No antivirus required since downloading is only from App store.

CONCLUSION Security is provided in order to reduce the potential risk for customers iOS is more advantageous than ANDROID interms of security. To keep our data safe: Regular updating of smartphone. Make use of passcodes to lock the device. Do not root OS files Installation of Anti-virus. Regular Back-up. Mobile-tracking applications. Do not install untrusted applications.

REFERENCES [1] Rosilah Hassan, Muhammad Syahrin Ab. Rahman, Mohd Rosmadi Mokhtar, Aini Aman, Mobile Accounting Version 1 Design of Mobile Costing Application for MSMEs Using Android, IEEE ICACT 2013, PyongChang Korea Jan 27-30, 2013, pp.697-701. [2] http://www.rdacorp.com/2012/08/mobile- applicationdevelopment-security [3] https://community.rapid7.com/community/mobilisafe/ blog/2012/12/21/ inside-the-sandbox [4] http://source.android.com/tech/security/ [5] http://www.howtogeek.com/129896/htg-explains-does- your-androidphone-need-an-antivirus/ [6] https://developer.android.com/training/articles/security- tips.html

Thank you Any queries ?