**2. Methodology**

This study was possible through my experience as a teacher in the discipline of information security, which allowed to make a systematic evaluation of the research, so we opted for qualitative research based on bibliographic reference, documentaries, and with quantitative techniques, which allowed to evaluate the study in detail, understand how is the care of existing information, present which of the operating systems is the safest as to data protection. Detect system vulnerabilities and present some contingency measures of cyber attacks.

*Comparative Study of Information Security in Mobile Operating Systems: Android and Apple iOS DOI: http://dx.doi.org/10.5772/intechopen.109652*
