**4.2 iOS**

Apple's operating system is extremely of Android which is a free system, iOS is closed and has many restrictions to prevent certain pests from affecting the system, manufactured by Apple's kernel, the first iPhone was released in June 2007, and many phones were sold during its launch in the US, being the second in the world with the largest number of devices, has many peculiar features that attract its customers, its graphics and image resolution, the quality of photos are one of the preferences, but we do not mean that only these details, has others for the choice of one or the other, as well as some complaints from some customers, the form of protection of the shop, and the impediment of sending data via "bluetooth," which on the one hand for some disadvantages, others see as being protection, since many viruses contaminate through the Bluetooth connection. However, we cannot say that the system is so robust from the security point of view as can be seen in Pandya and Stamp's quote [9]:

*It is clear that the iPhone is a vulnerable device with several security flaws. The iPhone's security philosophy itself has a significant flaw. Apple's approach to making the iPhone a secure device was to reduce "the intensity of the device attack 'or' the exposure of the device to vulnerabilities." To do this, Apple allowed write access only to a sandbox area on the file system and impermissible installation of third-party applications.*

The iOS systems allow cyber attacks, although different from Android, but the attacks affect and change the password of the system root, making Crack replicate information to the other host (host) without the user realizing, another way is when the attack is done in the App store, the fastest virus that can destroy the boot system is the Trojan horse very fast in the way of contamination. But the worrying thing is the spies (spywares) that monitor every process of the mobile phone to steal confidential information.

### **4.3 Describing vulnerabilities in operating systems: Android and Apple iOS**

Android is a secure system from the point of view of computer viruses, but it also has some vulnerabilities, however it is important to describe some incorrect practices of attacks and configuration changes:

1.Android is based on the technology and programming languages java, kotlin, C, and C++, there are many developers, which makes it vulnerable;

*Comparative Study of Information Security in Mobile Operating Systems: Android and Apple iOS DOI: http://dx.doi.org/10.5772/intechopen.109652*


For Apple's iOS is also a secure operating system, but it is important to mention some incorrect practices:


However, this seems to be simple information about vulnerability, but it is very important to know the security of the information of both, because they are the most popular phones, and if we compare the damage is fatal, it reminds us of the Panama Papers. According to the Terra website [10]:

*The leak of 11.5 million documents—the so-called Panama Papers from Panamanian law and consulting firm Mossack Fonseca, the world's fourth largest offshore law firm, is said to have revealed details of hundreds of thousands of clients using overseas tax havens allegedly for tax evasion, money laundering, drug, and arms trafficking.*

Imagine thefts by espionage by videos, images, information, confidences, or the cloning of the credit card that produce an impact on the average, things that there is no price, in your company as to your reputation, sometimes we can be blackmailed millions of dollars, this does not worry?

#### **4.4 Unsafe practices in mobile phones of systems: android and Apple iOS**

In this theme it is important to mention some unsafe practices of users, facilitating the crack to carry out cyber attacks, in this case the customers somehow contribute by not having basic education in information security. In this case the failures are not always related to the company that developed the mobile device, so when we talk about these two systems we can deduce that they are robust and safe regarding the attacks on computer viruses, with some specificities that differ them. However, it is necessary to know how we have failed, since each one of us has used an Android mobile phone or iPhone and knows how it works, but with some limitations of the information security processes, carelessness has been noticed in many users of mobile devices, which translates into huge economic losses, social engineering, cloning of credit cards on unshielded sites, are the focus of Hackers and Crackers to perform computer crime. For Futurelearn [5]: "Cyber security attacks take many forms, from

obtaining personal information of users to attacking critical national infrastructure and obtaining proprietary data of companies." However, we can name three forms of attacks:


Given this panorama, it is important to conclude this topic by touching on some harmful practices caused by carelessness, lack of knowledge, ignorance, among others, which allow computer theft in mobile phones:


### **4.5 Propose security measures in operating systems: android and Apple iOS**

"A saying used by people dealing with computer security issues goes as follows: A totally secure system is one that is switched off, locked in a vault and watched over by armed guards"(Ferreira [11]).

Security measures can be in the scope of hardware (Physical) and software (Logical). There are several, but we will mention only a few, and we cannot forget four protocols for information security:

1.Authenticity: the term allows us to accredit that it is authorized. The information must be used by the user and not someone else;

*Comparative Study of Information Security in Mobile Operating Systems: Android and Apple iOS DOI: http://dx.doi.org/10.5772/intechopen.109652*


#### *4.5.1 Measures can also be preventive, detective, and corrective*


#### *4.5.2 Logical safety policy*


Medranda [12] makes mention about the level of security used in social networks:

*The first category studied was the level of security of social networks, considering the choice and use of the security password used by students in social networks, 112 students responded that they used the same password for all, but not for email or mobile phone, which represented 67.5% of the total. 21.8% (35 students) they mentioned that it differs depending on the social network and also different from the email address and mobile phone PIN. The lowest percentage corresponded to the use of the password for everything (social networks, email and mobile phone) 8.1%.*

However, we can observe that social networks are now the focus for many contaminations and cyber attacks. According to Tumejormovil [13] "In fact, according to 2017 studies, 67.1% of mobile phones worldwide have Android and, specifically in Spain, 90%, so it is shown that it is a good operating system and could quietly be the best on the market." As we said before by the numbers of users in mobile cellular devices, the control must be jointly, the company does its part in implementing security and the customer must follow the same security protocol to avoid security collapse. For Rina [14] "iOS Mobile Operating System: iOS (formerly called iPhone OS) is from Apple Inc. It has the second largest installed base worldwide in smartphones, but the largest profits due to aggressive price competition between Androidbased Manufacturers." Yes, iOS has a lot of audience, despite its restrictions and some bureaucratic processes that on the other hand is a security mechanism that is often not understood, a very simple example the Bluetooth on Android is not possible to send to iOS, the withdrawal of any information on the iPhone is difficult compared to Android.

*Inside briefly we can explain that these two largest world markets (OS) are evolving and expanding as iOS to include versions of many features that are in Android. Meanwhile, Android gets a technical overhaul that it needs to match iOS in terms of speed and battery life (Haseeb [15]).*

In other words, the Android operating system has many versions and many mobile devices on the market, the two operating systems try to solve some differences, now Android tries to find technology to overcome or match a feature that iOS has the battery life, that there are already also mobile phones Android mobile phones with acceptable battery life.

*Comparative Study of Information Security in Mobile Operating Systems: Android and Apple iOS DOI: http://dx.doi.org/10.5772/intechopen.109652*
