**5. Results and discussion**

Android and iOS operating systems regarding computer viruses are safe, but each one has its vulnerability, because we cannot say we are totally safe, from the point of view of comparison with the two operating systems Android and Apple iOS, the latter presents greater protection of the security system, Since Apple's iOS was made by a different programming language than Android, we know that there are specific attacks for a particular operating system, for example, Android tends to be more vulnerable than iOS, by having an open platform that translates into a considered number of developers, otherwise the permission of the installation outside the play store.

Android and iOS operating system are the most preferred of cyber attacks as they have many users.

As for cyber attacks, social networks are now the focus for many contaminations.

In the path of information security in Apple iOS operating system takes a better approach Alvarez [16] "To protect its users from malicious apps, Apple has introduced a vetting process which ensures that all apps follow Apple's privacy rules before they can be made available through the App Store."

In this security theme for iOS, there has been another investment from the PiOS tool, which does statistical analysis to find information from Objective-C source code and Mach-Obinaries data flowcharts. This tool has been successful in checking for information leaks on mobile devices.

We can note that some insecure practices by users make it easier for Crack to carry out cyber attacks. Carelessness has been noted in many users of mobile devices, which causes the cloning of credit cards that translates into economic and financial losses.

It is not always the user who fails, but also some companies do not properly protect customer information.

It is important that companies promote basic training on information security techniques to employees.

However, to have security, it is necessary to use the protocols: authenticity, confidentiality, integrity, and intimacy. As for the measures of always: Preventive, detective, and corrective. Regarding the security policy, we suggest some applications already mentioned previously to be able to protect the computer systems.
